Edimax | 10-2011 | User manual | Edimax 10-2011 User manual

Edimax 10-2011 User manual
IC-3015Wn
User Manual
10-2011 / v1.0
Copyright Copyright © Edimax Technology Co., Ltd. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission from Edimax Technology Co., Ltd. Edimax Technology Co., Ltd. makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability, or fitness for any particular purpose. Any software described in this manual is sold or licensed as is. Should the programs prove defective following their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the software. Edimax Technology Co., Ltd. reserves the right to revise this publication and to make changes from time to time in the contents hereof without the obligation to notify any person of such revision or changes. The product you have purchased and the setup screen may appear slightly different from those shown in this QIG. For more information about this product, please refer to the user manual on the CD‐ROM. The software and specifications are subject to change without notice. Please visit our website www.edimax.com for updates. All brand and product names mentioned in this manual are trademarks and/or registered trademarks of their respective holders. Edimax Technology Co., Ltd. Add: No. 3, Wu‐Chuan 3rd Rd., Wu‐Ku Industrial Park, New Taipei City, Taiwan Tel: +886‐2‐77396888 Email: sales@edimax.com.tw Notice According to GNU General Public License Version 2 This product includes software that is subject to the GNU General Public License version 2. The program is free software and distributed without any warranty of the author. We offer, valid for at least three years, to give you, for a charge no more than the costs of physically performing source distribution, a complete machine‐readable copy of the corresponding source code. 1 Contents Copyright ........................................................................................................................................................................... 1 Contents ............................................................................................................................................................................ 2 Chapter I: Introduction ..................................................................................................................................................... 4 1.1 Highlights of your new Network IP Camera ............................................................................................................ 4 1.2 Safety Instructions .................................................................................................................................................. 4 1.3 Package Contents .................................................................................................................................................... 5 1.4 Installing the Network Camera ............................................................................................................................... 8 Chapter II: Accessing the Camera’s Web Interface ......................................................................................................... 10 2.1 Network Setup ...................................................................................................................................................... 10 2.2 Connecting to the Camera’s Web User Interface and Installing the ActiveX Plugin (IE only) .............................. 13 2.3 Live Video Monitoring ........................................................................................................................................... 17 Chapter III: Setting Up the Network Camera .................................................................................................................. 20 3.1 Basic Network Settings .......................................................................................................................................... 21 3.2 Wireless ................................................................................................................................................................. 24 3.3 Dynamic DNS ......................................................................................................................................................... 29 3.4 Date & Time .......................................................................................................................................................... 31 3.5 Users ..................................................................................................................................................................... 33 3.6 UPnP ...................................................................................................................................................................... 35 3.7 Bonjour .................................................................................................................................................................. 36 Chapter IV: Video Configuration ..................................................................................................................................... 38 4.1 Video Settings ....................................................................................................................................................... 38 4.2 Image ..................................................................................................................................................................... 39 Chapter V: Event Configuration ...................................................................................................................................... 41 5.1 Motion Detection Setup ........................................................................................................................................ 41 5.1.1 Detection Region ............................................................................................................................................ 42 5.1.2 FTP .................................................................................................................................................................. 44 5.1.3 SMTP .............................................................................................................................................................. 46 Chapter VI: System Configuration ................................................................................................................................... 50 6.1 “Basic” Settings ..................................................................................................................................................... 50 2 6.2 “Advanced” Settings ............................................................................................................................................. 51 Chapter VII: System Status .............................................................................................................................................. 53 7.1 System Information ............................................................................................................................................... 53 7.2 System Log ............................................................................................................................................................ 55 Chapter VIII: Advanced Operations................................................................................................................................. 57 8.1 Applying for a Free DynDNS Account .................................................................................................................... 57 Chapter IX: Windows Surveillance Utility ....................................................................................................................... 63 9.1 Installing the Network Camera Administration Software ..................................................................................... 63 9.2 Using the Network Camera Surveillance Software ............................................................................................... 72 9.3 Configuring the Network Camera Surveillance Software ..................................................................................... 75 9.3.1 Camera Configuration .................................................................................................................................... 75 9.3.2 General Settings ............................................................................................................................................. 84 9.4 Changing the Display Layout ................................................................................................................................. 91 9.5 Full‐Screen Mode .................................................................................................................................................. 94 9.6 Scan ....................................................................................................................................................................... 95 9.7 Zoom‐In/Zoom‐Out ............................................................................................................................................... 96 9.8 PTZ ......................................................................................................................................................................... 97 9.9 Snapshot ................................................................................................................................................................ 98 9.10 Recording ............................................................................................................................................................ 99 9.11 Video Playback .................................................................................................................................................. 100 Chapter X: Appendix ..................................................................................................................................................... 101 10.1 Troubleshooting ................................................................................................................................................ 101 3 Chapter I: Introduction 1.1 Highlights of your new Network IP Camera Congratulates on purchasing this tiny network IP Camera! Its tiny size maximizes portability and eases installation; you can easily install the camera in most places where you need video surveillance. If there’s no Ethernet cable available at the place you wish to install this IP camera, you can use built‐in wireless network to connect to your network, and saves the cost of cabling. Other highlights of this network IP Camera include: z Compact size and lightweight design, installs anywhere. z Mounting hole located at camera’s back, compatible with most of camera tripods. z Wireless network with data security (encryption), secures data transfer over the air. z Fixed‐focus lens, works with most of environments. 1.2 Safety Instructions Please obey the safety instructions listed below when you’re using this Network IP Camera, or you would harm this camera and / or yourself! Also, the warranty will become void if you disobey these safety instructions. z This Network IP Camera is sophisticated electronic device; do not drop it from high places. z Do not place this IP Camera at hot / humid places, and avoid direct sunlight. z This IP Camera is not a toy; keep it out from the reach of children. z Do not insert any accessories of this IP Camera into your body. z If you want to use this IP Camera at any place that may be spilled by water or dirt, a secure and water‐proof camera housing is required. z Do not pull any cord that is connected to this IP Camera by force. 4 z IP Camera will become hot after long time of use. Refrain from touch IP Camera with hand, or cover this IP camera with paper or cloth. z If the IP Camera falls into water when powered, do not attempt to retrieve it back by yourself! Find a qualified electric technician for help. 1.3 Package Contents Please check the contents of your new Network IP Camera when you unpack the package. If any item is missing, please contact your dealer of purchase for help. z
z
z
z
z
z
Network camera (1 pcs) Power adapter (1 pcs) Ethernet cable (1 pcs) Mounting kit (1 pcs) CD with utility software and user manual (1 pcs) Quick installation guide (1 pcs) 5 Familiar with your new Network IP Camera [Front] Antenna Lens Power / WPS LED LAN/WiFi LED Item 1 ‐ Lens 2 ‐ POWER LED 3 ‐ Network LED 4 ‐ Antenna Description
IP Camera’s lens. Please keep the lens clean and do not touch by finger.
POWER LED will light when the IP camera is powered on, and will flash when resetting IP camera’s settings. (LED light can be switched off even IP camera is powered on when necessary for security reasons)
Ethernet LED will light when IP camera is connected to Ethernet network, and it will flash fast when transferring data (It will flash slow when using WPS). (LED light can be switched off even IP camera is powered on when necessary for security reasons)
Wireless antenna. Please keep the antenna perpendicular to the ground for best signal reception. 6 [Back] Tripod Connector LAN port WPS / Reset POWER Item Description
1 ‐ Tripod connector This mounting hole is compatible with most of camera tripod or camera stand, so you can fix the camera at a secure place.
Connects to your local area network. 2 ‐ LAN Connects to 5V DC power adapter.
3 ‐ 5VDC When the IP camera is not functioning properly, 4 ‐ WPS / RESET you can press reset button to reset the IP camera. You can also press and hold this button for more than 10 seconds to clear all settings of IP camera, include administrator password.
7 1.4 Installing the Network Camera Please follow the following instructions to setup your new IP camera. 1. Secure the IP Camera to the tripod or camera stand by mounting hole. If you want to place the IP camera on desk, please make sure it will not fall down by accident. 2. Connect Ethernet cable to LAN port. For first‐time installation you’ll need Ethernet cable to do configuration; If this IP camera is configured to use wireless network, you can skip this step. Connect Ethernet net cable 3. Plug DC power adapter to power outlet on the wall. 4. Connect DC power cable to IP Camera’s DC power connector. Connect DC power cable to DC Jack 8 If everything’s ok, you should see the POWER LED light up (and Ethernet LED, if Ethernet cable is inserted). If not, please recheck every step and try again, or ask your dealer of purchase for help. Please note if you configured IP camera to switch LED lights off, two LED lights won’t light. 9 Chapter II: Accessing the Camera’s Web Interface 2.1 Network Setup This IP camera’s default IP address is 192.168.2.3, and you must use a computer that uses 192.168.2.x IP address to connect to it. Please follow the following instructions to setup your computer’s IP address: 1. Please click ‘Start’ button and then click ‘Control Panel’. 2. Click ‘View network status and tasks’ under ‘Network and Internet’ 10 3. If you didn’t see ‘Network and Internet’ in control panel, please look for ‘Network and Sharing Center’ icon and double‐click it. 4. Click ‘Local Area Connection’ 5. Click ‘Properties’ 6. Click ‘Internet Protocol Version 4 (TCP/IPv4), and then click ‘Properties’ 11 7. Click ‘Use the following IP address’, and then input ‘192.168.2.1’ in ‘IP address’ and ‘255.255.255.0’ in Subnet mask’, just like shown on the left. Click ‘OK’ when finish, and close all open windows you opened 12 2.2 Connecting to the Camera’s Web User Interface and Installing the ActiveX Plugin (IE only) For first‐time installation, you can connect to IP camera by Internet Explorer web browser by entering its default IP address: 192.168.2.3 in address bar: The use login screen will appear when you get connected: IP Camera’s administrator username is ‘admin’ (lower case) and password is ‘1234’ by default. Click ‘OK’ button or press ‘ENTER’ key on your keyboard when you finish entering username and password. When you connect to IP Camera for the first time, you’ll see the following message: 13 This message prompts you that you need to install ActiveX plugin before you can see the video from IP Camera. Click ‘Download ActiveX’ link to install ActiveX plugin: Click ‘Run’ to start installation. After few seconds, you’ll see this message: For IE9: The message will appear at the bottom of Internet Explorer: 14 Click ‘Run’ to begin installation. You may see UAC (User Account Control) message after you click ‘Run’ button: Click ‘Yes’ to continue. Installation procedure will begin: Click ‘Next’ and ‘Install’ when you’re prompted to install ActiveX control. When you see this message, installation is complete: 15 Click ‘Finish’ to close the window. Now, go back to web browser window and login again, you should be able to see camera’s image: 16 2.3 Live Video Monitoring To view the live video from IP camera, please log onto IP camera’s web interface as described in last chapter, and you can see live video view: When you’re in other setup pages of IP camera, you can click ‘Live View’ link located at the upper‐right corner of IP camera’s web interface: There are also some functions you can use in camera’s live view page: 17 The descriptions of these items are listed below: Item Description Snapshot Take a snapshot (save a picture) of current live view. Click the folder field (‘c:\’ by default) and you’ll be prompted to select a folder in your computer, and click ‘Get snapshot’ button to save a picture. Record Start recording video. Click the folder field (‘c:\’ by default) and you’ll be prompted to select a folder in your computer, and click ‘Start recording’ button to start recording. Fit to window Click this button and the live view area will adjust according to the size of web browser automatically. Full Screen Click this button and the live view will expand and fit the size of your computer monitor. Press ‘Esc’ key on your keyboard to resume. Digital Zoom Click this button and a new window will popup: Check ‘Enable’ box to enable digital zoom (enlarge video so you can see objects in detail). Drag the slide bar from 100% (no enlargement) to 400% to enlarge the image. The level of enlargement will be displayed in ‘Zoom Factor’ field. 18 When you’re enlarging image (i.e. Zoom Factor > 100%), a green rectangular will appear in the image area: Drag the green rectangular to move the position of enlarged area in image. 19 Chapter III: Setting Up the Network Camera To setup the IP camera, please log onto IP camera’s web interface and click ‘Setup’ link on the upper‐right corner: The setup menu will appear: There are five setup categories: Basic, Video, Events, System, and Status, which are located at the left of web interface. When you click on the link of every category, it will expand and show sub‐menu. Please refer to following chapters for detailed instructions. 20 3.1 Basic Network Settings In this menu, you can setup Ethernet network settings. (NOT Wireless Network!) The descriptions of these items are listed below: 21 Item Network Type Description Select the type of Ethernet connection: Static IP, DHCP, and PPPoE. Please select one from dropdown menu, if you’re not sure, please consult your network administrator or ISP. Static IP: IP: Please assign an IP address to this IP camera. Netmask: Please input the netmask of IP address. Gateway: Please input the gateway address of your network. Primary DNS: Input the IP address of DNS server. Secondary DNS: Input the IP address of secondary (backup) DNS. You can leave this field blank if no secondary DNS is available. HTTP port: The default web port number is 80, if you want to change it, you can input it from 1024 ~ 65535 in this field. When you connect to this IP camera next time, you 22 have to add a colon and port number after IP camera’s IP address. For example, if the camera’s IP address is 192.168.2.3 and HTTP port number is 82, you have to input ‘http://192.168.2.3:82’ in web browser’s address bar. DHCP: IP camera will obtain IP address from DHCP server on your local area network automatically. PPPoE: IP camera will connect to network by PPPoE. Please input PPPoE user name and password, and input MTU value when required. Please note: In some cases you can improve network efficiency or correct connection problem by setting a new MTU value, however, In most cases you don’t have to change MTU setting. Click ‘Apply’ button to save changes you made. 23 3.2 Wireless You can establish wireless connections to other network devices such as network AP. 24 When you enter this page, IP camera will scan for wireless devices nearby automatically and display them here. The descriptions of these items are listed below: Item Description Wireless You can enable or disable wireless Connection functionality here. Please note: You can switch wireless network off, but you can’t switch wired Ethernet off. Network Type Select the type of network you wish to connect: Infra (infrastructure: wireless access point) or Ad Hoc (point to point wireless connection). Mode Select the wireless operating mode: B (802.11b, maximum 11mbps) G (802.11g, maximum 54mbps) N (802.11n, maximum 150mbps). You can select mixed mode (2.4GHz B+G+N) so IP camera will work with all 25 Band Available Networks SSID Channel Authentication kinds of wireless network. If you select B, G, or N only, then IP camera will be able to communicate with wireless network of same operating mode only. Select wireless band: 20MHz only or 20/40MHz auto switch. It’s recommended to select ‘Auto 20/40MHz’. IP camera will list all nearby networks and their parameter in this field. If the network you wish to connect does not appear hear, click ‘Refresh’ to rescan again. You can click ‘Refresh’ button for many times until the network you wish to connect appear in the list. If you wish to connect to a specific network, select the radio button of the network you wish to connect (under ‘Connect’ field), and the network’s connection parameter will appear in the fields below. Tips: If you can’t see the network you wish to connect after you click ‘Refresh’ button for many times, please move IP camera closer to the network’s access point). Input network’s SSID (access point’s wireless name) here, or select one network from network list above. If he network you wish to connect is a ‘hidden’ network (SSID is hidden to the public), you have to input SSID manually. Select wireless channel number. Use ‘Auto’ to select channel automatically. Select authentication type: 26 None: no encryption
WEP: use WEP encryption WPA‐PSK: Use WPA with PSK encryption. WPA2‐PSK: Use WPA2 with PSK encryption. The authentication type you selected here must be identical with the setting of access point. Encryption Type Select wireless encryption type. This option will vary depends on the authentication type of the network you wish to connect. The encryption type you selected here must be identical with the setting of access point. WPA Pre‐shared Input WPA pre‐shared key here, must be Key identical with the setting of access point. (This field is not available when authentication type is none or WEP). WEP Key Format Select WEP key’s format: Hex or ASCII.
This setting must be identical with the setting of the network you wish to connect. WEP Key length Select WEP key’s length: 64 or 128‐bit. This setting must be identical with the setting of the network you wish to connect. WEP Key Input WEP key here. 27 This setting must be identical with the setting of the network you wish to connect. You can also setup encrypted wireless connection by WPS (Wi‐Fi Protected Setup): The descriptions of these items are listed below: Item Description Self PinCode Displays the 8‐digit pin code of this IP camera. Write this number down and you’ll need this number so get connected with other WPS‐enabled network devices when requested. Configure via Click ‘Start PBC’ button to start PBC‐style Push Button WPS pairing sequence: Click this button, and push WPS button of the access point (or click a software button in access point’s configuration web page). You must press WPS button of the wireless device you wish to connect within 120 seconds. Configure via Click ‘Start PIN’ to start PIN‐style WPS PinCode pairing sequence. You have to input WPS registrar’s SSID in ‘Registrar SSID’ field first. Click ‘Apply’ button to save changes you made. 28 3.3 Dynamic DNS If your Internet service provider didn’t issue you a fixed IP address, you can use this function to report your current IP address to dynamic DNS service provider, so you can locate your IP camera without having a fixed IP address. The descriptions of these items are listed below: Item Description Enable DDNS Select ‘Enable’ to enable DDNS 29 Provider Host Name User Name Password functionality, orselect ‘Disable’ to disable DDNS functionality. Select Dynamic DNS service provider you’re using from dropdown menu. Input the hostname you registered with DDNS service provider. Input the user name you registered with DDNS service provider. Input the password you registered with DDNS service provider. Click ‘Apply’ button to save changes you made. TIPS: You can register free (or paid) dynamic DNS service from following website: Dyndns: www.dyndns.org Refer to Chapter VIII for DDNS application. 30 3.4 Date & Time You can setup IP camera’s system date and time here. Maintaining a correct system time is very essential when you need to replay recorded video. The descriptions of these items are listed below: Item Description Mode Select date & time setup mode:
Manually: Set time manually. 31 Set Date/Time Manually Synchronize to PC time NTP Server Time Zone Daylight Saving NTP: Use NTP (Network Time Protocol) to setup date and time automatically via network. If you have Internet connection or there’s a NTP server on your local network, you can select this function to help you to keep IP camera’s date and time correct. There are 6 fields for you to input current date / time. The format is: YYYY/MM/DD HH:MM:SS Click this button the fill date / time field with your computer’s date and time. Input NTP server’s hostname or IP address. Select the time zone of the place you live from dropdown menu. If the area you live uses daylight saving, select ‘Enable’, or select ‘Disable’ when daylight saving is not used. Click ‘Apply’ button to save changes you made. 32 3.5 Users Besides default system operator account ‘administrator’, you can add additional operator account or user account here: Operator accounts can perform all functionalities and do configurations of this IP camera, while guest accounts can view image only. 33 The descriptions of these items are listed below: Item Description User List Lists all existing operators / users here. To modify an operator / user’s setting, click his / her name here first. User Name Input user’s name here.
Password Input user’s password here.
Confirm Input user’s password here again for password confirmation. Authority Select this user’s privilege: Operator can view video and go to setup page to change video setting. Guest can view video only. Add Click this button to add a new user with settings above. Modify Click this button to save changes of an existing user. Remove Click this button to remove a user. You must select a user in ‘User List’ field first. Anonymous Select ‘Enable’ to enable anonymous user Login to login this IP camera and view image. This function is useful when you want to establish a remote video server which 34 welcomes everyone to view the video.
If you only want to allow registered user to login, select ‘Disable’. Click ‘Apply’ button to save changes you made. 3.6 UPnP When you enable this function, Windows computers can discover this IP camera from windows network neighbor directly, and you don’t have to know this IP camera’s IP address in advance (This only works on local area network). 35 Select ‘Enable’ to enable this function, or select ‘Disable’ to prevent users on local area network to discover this IP camera. 3.7 Bonjour When you enable this function, Macintosh computers can discover this IP camera from safari web browser directly, and you don’t have to know this IP camera’s IP address in advance (This only works on local area network). Select ‘Enable’ to enable this function, or select ‘Disable’ to prevent users on local area network to discover this IP camera by safari browser. 36 Tips: Bonjour function must be enabled in safari browser first. 37 Chapter IV: Video Configuration In video configuration setup page, you can change the resolution and frame rate, so you can decide the video quality by the bandwidth you have. 4.1 Video Settings You can change resolution and frame rate settings here. The descriptions of these items are listed below: Item Description Resolution Change video resolution from dropdown list. Available resolutions are: SXVGA (1280 x 960) VGA (640 x 480) QVGA (320 x 240) Higher resolution provides mode video details, but requires more bandwidth. MAX. Frame rate Select the maximum video frame rate. Higher frame rate provides more fluent video, but also requires more bandwidth. 38 Please note: When the environment is dark, this IP camera will automatically adjust frame rate to a lower setting to provide better video quality by using a longer exposure time. Power frequency Select the AC utility power’s frequency (50 or 60Hz). This will help reduce the flicker of video when there’s certain kind of lamp. If you don’t know the frequency of power you’re using, you can consult your utility power company. Click ‘Apply’ button to save changes you made. 4.2 Image You can change video appearance settings here. The descriptions of these items are listed below: 39 Item Brightness / Contrast / Saturation / Sharpness / Hue Reset to default Save value Description Change video’s appearance. If you think you don’t like the video as it appears, you can change these parameters. Drag the blue lever by mouse to change the value. Click this button to reset all settings back to default value (50). Save changes you made.
40 Chapter V: Event Configuration This IP camera is capable to detect motions. You can use this function to use this IP camera as a security alarm and send the image to you by E‐Mail or upload to FTP server when there’s motion. 5.1 Motion Detection Setup You can enable or disable motion detection settings here. The descriptions of these items are listed below: Item Description Motion Select ‘Enable’ to enable motion detection Detection enable function, or ‘Disable’ to disable it. Motion Select the time interval this IP camera Detection detects motion. Interval To detect minor motions, select a shorter time; to ignore minor motions, select a longer time. 41 Send snapshot to Select ‘Enable’ to send a snapshot picture E‐Mail to designated email recipient; select ‘Disable’ to disable this function. Send snapshot to Select ‘Enable’ to upload a snapshot FTP picture to designated FTP server; select ‘Disable’ to disable this function. Click ‘Apply’ button to save changes you made. 5.1.1 Detection Region You can setup the area in video where IP camera should detect changes in video (motion). Motions outside of detection region will be ignored by IP camera, and IP camera will do nothing when a motion is detected outside of detection region. This will help you to minimize the chance of false alarm. When you select this setup page, you’ll see the following setup page: (The setup page’s video view window is intentionally set to black so you can see 3 motion detection regions clearly). 42 The descriptions of these items are listed below: Item Description Region 1 / Check the box to enable this motion Region 2 / detection area. A rectangle will appear on Region 3 the video view when it’s checked (enabled). To change the size of motion detection area: Point the mouse to the upper‐left, upper‐right, lower‐left, lower‐right corner 43 Sensitivity Threshold Refresh Save of motion detection rectangle, and drag the mouse. Move motion detection area: Put the mouse within the motion detection area, and drag the mouse. Change the sensitivity of motion detection. Set to a higher value (right) and IP camera will trigger the alarm when there’re only small changes in video. If you found that IP camera sends E‐mail or uploads picture to FTP too frequently, and there’s nothing happen in the snapshot video, you can set to a lower value. Set the motion detection threshold here (input number 0 to 100). A higher value represents IP camera will only trigger alarm when the object in motion detection area is really big. Refresh the reference picture.
Save changes you made in this page.
5.1.2 FTP You can upload a snapshot picture when motion detected by this IP camera. 44 When you select this setup page, you’ll see the following setup page: The descriptions of these items are listed below: Item Description FTP Server Input the IP address or host name of the FTP server. User Name Input the user name required by FTP server. Password Input the password of FTP server.
Port Input the port number of FTP server, this should an integer between 1 to 65535. 45 Path Passive mode Please don’t change this value until instructed by FTP server’s administrator. Input the path (folder) you wish to save snapshot file on FTP server. If you don’t want to specify folder, you can leave this field blank, and snapshot files will be saved in the default folder when logged onto FTP server. Default setting is ‘Enable’ (use passive mode). If the FTP server you’re going to use does not support passive mode (using active mode), select ‘Disable’ here. Click ‘Apply’ button to save changes you made. You can also click ‘Send a test file’ button to upload a test file to FTP server, and a message box will appear to indicate if the FTP upload is successful, so you can examine if the parameters you set in this page are correct. 5.1.3 SMTP You can send a snapshot picture by E‐Mail when motion detected by this IP camera. 46 When you select this setup page, you’ll see the following setup page: The descriptions of these items are listed below: Item Description Public Server If you’re using Hotmail, Yahoo mail, or Google mail, select appropriate item from dropdown menu, and IP camera will fill the SMTP server address and port number for you automatically. 47 SMTP Server SMTP Port Recipient E‐Mail Address Sender E‐Mail Address SSL/TLS SMTP Authentication Account Password Input the host name or IP address of SMTP server. SMTP server is usually provided by your ISP. Input the SMTP port number here. Most of SMTP servers use port number ‘25’, while some SMTP servers uses encrypted connection and port number is ‘465’. Consult mail server administrator when in doubt. Input E‐mail recipient (receiver)’s E‐mail address here. Input an E‐Mail address here, which will be used by E‐Mail sender’s address. This will help you to identify the E‐Mail sent by this IP camera, and will help you to prevent problems caused by anti‐spam software. Select ‘SSL or TLS’ when your SMTP server requires encryption. When in doubt, consult your SMTP server administrator. Select ‘Enable’ when your SMTP server requires authentication. When in doubt, consult your SMTP server administrator. Input SMTP account when your SMTP server requires authentication. Input the password used for SMTP server authentication. 48 Click ‘Apply’ button to save changes you made. You can also click ‘Send a test E‐mail’ button to send a test E‐mail to SMTP server, and a message box will appear to indicate if the E‐mail send is successful, so you can examine if the parameters you set in this page are correct. 49 Chapter VI: System Configuration You can configure the basic system settings in this setup page, or backup / restore system configurations. 6.1 “Basic” Settings You can set the camera’s name and password here. You can also change the behavior of LED lights. The descriptions of these items are listed below: Item Description IPCamera Name Set the name of IP camera. It’s recommended to use a meaningful name which can describe the location where the IP camera is installed. This will help you to identify IP camera when you have more than one IP cameras. Administrator Input administrator’s new password here if Password you want to change it. Confirm Input administrator’s new password here Password again for confirmation. LED Indication For security reasons, you can disable the LED lights in front of IP camera by select 50 ‘off’ here, so other people can’t identify if the IP camera is working by them. Click ‘Apply’ button to save changes you made. 6.2 “Advanced” Settings You can save or restore IP camera’s configuration file here. You can also reboot the IP camera remotely here. The descriptions of these items are listed below: Item Description Firmware You can improve the functionality of this IP Filename camera by uploading new firmware file when available. Please download new firmware file from our website, and save it to your computer’s hard disk. Then, click ‘Browse’ button to select the file on your hard disk, and click ‘Apply’ button to upload the firmware to IP camera. Backup Config Click ‘Apply’ button to download current 51 Restore Config Reboot Now Reset to default configuration as a file and save it on your computer’s hard drive. Click ‘Browse’ button to select a previously‐saved configuration file on your computer’s hard drive, and then click ‘Apply’ to upload the configuration file. Click this button to reboot IP camera. This function is useful when you think IP camera is not working properly. Reset the IP camera’s setting back to default value. There are 2 options: 1) Keep Network Setting: Reset all settings back to default value, except network settings. You can still use the same IP address to connect to the IP camera. 2) Factory Default: Reset all settings, include network settings. Please reconnect to IP camera by its default IP address: 192.168.2.3 Click ‘Apply’ to reset. You can press and hold ‘WPS / Reset’ button for more than 10 seconds to reset IP camera’s setting to default value. 52 Chapter VII: System Status You can view the status of this IP camera, which is helpful when you need to do detailed configuration, or debug. 7.1 System Information You can see system‐wide information of this IP camera here. 53 A system information summary page will appear like this: 54 7.2 System Log The IP camera’s usage and actions will be displayed here. The system log will appear here, you can use scroll bar to view logs, with some adjustable parameters: The descriptions of these items are listed below: Item Description Log Level Select the log level from dropdown list. Select 0 and the IP camera will only log very important information, or select 4 to log everything. Remote Log This IP camera can send log information to a remote server for archive. Select ‘Enable’ to enable this function. This IP camera supports syslog log server. 55 Remote Log Input the IP address or host name of log Server server you wish to use. Click ‘Apply’ button to save changes you made. 56 Chapter VIII: Advanced Operations In this chapter, you’ll learn how to apply a free DYNDNS account to use with this IP camera when you don’t have a fixed IP address, and view the video of this IP camera on your iPhone. 8.1 Applying for a Free DynDNS Account If your ISP issues you with an IP address which is not fixed, please follow the following instructions to apply for a free DYNDNS account to get a host name which is dynamically mapped to your current IP address. 1. Launch your web browser and navigate to http://www.dyndns.org 2. Click ‘Sign In’ button (located at upper‐right corner of dyndns.org’s webpage) 3. Click ‘Create an Account’ in pop‐up menu. 57 4. Fill all fields appear in this menu, and click ‘Create Account’ button to create a new account. You’ll be prompted if the account you selected is not available. 5. When you see this image, you’ll receive an e‐mail confirmation at the e‐mail box you registered with dyndns.org. 58 6. Check your e‐mail box and you should be able to get confirmation e‐mail. Click the link to connect to dyndns.org website and complete registration procedure. If you didn’t get the mail, please re‐check the e‐mail address, or click ‘resending it’ link in last step. Also, if nothing happen after you click the link, please copy the link text and paste it in web browser’s address bar. 59 7. When you see ‘Account Confirmed’ webpage, indicates your dyndns.org account has been confirmed and activated. Now you can click ‘Create a dynamic DNS host within our Free domains’ link to continue. 8. Click ‘Create Hostname’ button. 60 9. In this page: Input the hostname of your choice in ‘Hostname’ field, Select a domain name in dropdown menu, Select ‘Host with IP address’ for ‘Service Type’, Input current IP address in ‘IP Address’ field (or click the link below to use detected IP address to fill this field’. 10. Click ‘Add to cart’ continue. 61 11. Click ‘Next’ to continue. 12. Click ‘Activate Services’ to continue. 13. When you see this message, indicates your free dyndns.org hostname mapping service has been activated. You can go to chapter 2‐2‐3 to use your dyndns.org username, password, and hostname + domain name to locate your IP camera on Internet even you’re using dynamic IP address! 62 Chapter IX: Windows Surveillance Utility Besides using web browser to operate this IP camera, you can also use windows utility to use this IP camera, which provides faster access to all functions of this IP camera. 9.1 Installing the Network Camera Administration Software There are two files in the surveillance software’s folder: Setup_Admin_xxx and Setup_Viewer_xxx (xxx is version number and will be different as the version number changes). Please install Administration software first. You can use administration software to locate and administer IP cameras on your local area network. Please note that you still have to configure remote IP cameras (i.e. IP cameras on Internet) manually. 1. Double click the Setup_Admin_xxx file located in ‘xxx’ folder in supplied CD‐ROM, when the following window appears, click ‘Next’. 63 2. You can specify the destination folder of software installation, you can just use the default folder, and click ‘Next’ to continue. 3. If you need installation program to create a desktop icon or a quick launch icon for you, click all items you need here, than click ‘Next’ to continue. 64 4. Here lists all options you chose in previous steps, if everything’s correct, click ‘Install’ to start installing procedure, or click ‘Back’ to go back to previous step to modify installing settings. 5. The installing procedure will take some time, please be patient. 6. When you see this window, it means the software installing procedure is complete. Please click ‘Finish’ to finish the procedure (IP camera surveillance 65 software will start after you click ‘Finish’ button, if you want to start it later, uncheck ‘Launch IPCam Surveillance Software’ box). 1. After software is launched, you can click on your local area network. button to search for IP cameras 66 8. When one (or more) IP camera(s) is found: you can click button to connect to IP camera by web browser, or click button to configure its setting. You’ll be prompted to input IP camera’s administrator username and password if you wish to configure it: There are two setting pages. LAN Setting: 67 You can configure IP camera’s IP address setting in this page. You can either use ‘DHCP’ (IP camera will acquire IP address from DHCP server on your local area network automatically), or ‘Manual IP’ (you have to input IP address manually). Security: You can change IP camera’s name, and change its administrator password here by inputting new password in both ‘New Password’ and ‘Confirm Password’ field. 68 9.2 Install Video Viewer 1. Double‐click Setup_Viewer_xxx file to start installation. 2. Click ‘Next’ to continue. 3. You can uncheck the boxes here if you don’t want to create desktop / quick launch icon, and click ‘Next’ to continue. 69 4. Please check if everything’s correct here. If you want to change any setting, click ‘Back’ to go back to previous page, or click ‘Install’ to start installation. 5. Installation procedure takes few seconds to few minutes to complete, please be patient. 70 6. Installation is complete when you see this message. You can click ‘Finish’ to finish installation procedure and launch utility, or unckeck ‘Launch IPCam Surveillance Software’ box before you click ‘Finish’ button if you don’t want to launch software after installation is complete. 71 9.2 Using the Network Camera Surveillance Software You can click ‘IPCam Surveillance Software’ icon from desktop, quick launch bar, or start menu to start the IP camera surveillance software. Before you start:
IP camera surveillance software will only work when your monitor’s
resolution is ‘1024 x 768’. Please change the resolution before you
use IP camera surveillance software, or it won’t start.
Here are descriptions for all components of IP camera surveillance software: Video displaying area Language Display layout Full screen / Scan Zoom Out / Zoom In PTZ Control / Home Message display box Close window (stop surveillance) / Minimize window Recording / System configure Playback / Snap shot 72 You can put the mouse cursor on a certain component and see its button name, and here’re detailed descriptions of all buttons: Item Description Video The image of all connected cameras will be displaying displayed here. area Language Select a language from this dropdown menu to change display language. Display layout Change camera image display layout (Click a layout icon to change camera display layout). There are 8 kinds of available display layouts. Click this button to switch to full screen mode Full screen (only display all camera’s image), press ‘ESC’ key to quit full screen mode. Scan Click this button and the IP camera surveillance software will switch displaying the image of all connected camera automatically. Click this button once to activate scan function (scan icon will become blue ), click again to stop scanning (scan icon will become white ). Zoom‐out (To see more objects).
Zoom out This function is only available for supported cameras. Zoom‐in (Too see more details).
Zoom In This function is only available for supported cameras. PTZ control There are 8 directions in PTZ control ring. If the camera you connect support PTZ, you can use PTZ control ring to change the direction that camera points to. This function is only available for supported cameras. Click this button to return the camera to Home ‘Home’ (default) position. This function is only available for supported 73 Recording cameras. Start video recording.
Configure Software / camera configuration.
Playback Snapshot Playback a recorded video file.
Take a snapshot of current camera.
Message Displays all system messages like camera is display disconnected etc. Close window Terminates IP camera surveillance software. (stop surveillance) Minimize window Minimizes IP camera surveillance software window. Video displaying area Displays the image of all cameras by the display layout you selected. 74 9.3 Configuring the Network Camera Surveillance Software 9.3.1 Camera Configuration Before you use this IP camera surveillance software, you must configure the camera(s) you wish to connect. Please click ‘System configure’ button and a popup menu will appear: Please select ‘Configure Cameras’ to configure cameras: Note: If you’re prompted by a windows security alert which asks you if
you want to block ‘IPCamViewer’ program, please click ‘Unblock’
button, of IP camera surveillance software will not be able to function
correctly.
75 9.3.1.1 “Camera” Settings In this tab you can configure all cameras you wish to connect. Up to 16 cameras can be connected simultaneously: Here are the descriptions of all setting items: Item Description Channel Select the channel number you wish to set. Camera All cameras found on your local network will Search be displayed in ‘Camera Search’ box. Select Select a camera listed in ‘Camera Search’ box, and click ‘Select’ button to fill all parameters of selected camera in every camera configuration fields. Refresh Rescan all cameras on your local network. If you didn’t see the camera you expected in ‘Camera Search’ box, or new cameras has been joined to your local network after last scan. Name* Input the name of camera here. Default value 76 is the first 6 bytes of camera’s MAC address, you can change the name of camera so you can remember the camera’s location of purpose easily. Model Displays the model of selected camera, this field can not be changed. IP* Input the IP address of camera.
Username* Input the user name of camera.
Web Port* Input the web port of the camera. By default it’s ‘80’. Password Input the password of camera. Default value is ‘1234’. You should change the password if you changed the password of selected camera. Video Select the video encoding format of this Format** camera (MJPEG or MPEG4). Reset Clear all fields in ‘Camera Configuration’ section. OK Save settings in this tab.
Cancel Discard all settings in this tab.
*: It’s recommended to use ‘Select’ button to fill the content of this field. **: Only available for cameras support this function. After you’ve set all channels you wish to set, click ‘OK’ to save settings, and if everything’s correct, you’ll see the camera’s image in IP camera surveillance software’s main menu: 77 9.3.1.2 Scheduled Recording In this tab, you can setup scheduled video recording, so you can record the video captured by all cameras you have by a pre‐defined schedule. Here are the descriptions of all setting items: Item Description Channel Select the channel number you wish to set. One Time You can specify the one‐time schedule for selected Schedules camera; this schedule will be executed once only. New Click this button and a new window will appear: (One Time Schedules) 78 Edit Delete New (Weekly Schedules) Please specify the time duration of this one‐time schedule (the date and time of ‘From’ and ‘To’), then click ‘OK’ to save settings. Please note you must set a schedule that will be happened in the future, you can not set a schedule in the past. You can modify a scheduled recording item. Select a schedule in ‘One Time Schedules’ list, and click ‘Edit’ button to edit the start and end time of this schedule. Delete a selected schedule item.
Click this button and a new window will appear: You can define recording schedule that will be executed at the specified time of certain weekday(s) in a week. Please check all weekdays that applies, and set the start time in ‘From’ field. You can set the 79 Edit Delete OK Cancel duration of video recording in ‘Period’ field (format is HH:MM:SS), and the end time will be calculated automatically and displayed in ‘To’ field. You can also click ‘All Time Record’ button to define a recording schedule that will be executed every weekday, from 12:00:00AM to 11:59:59PM. Click ‘OK’ to save changes. You can modify a scheduled recording item. Select a schedule in ‘One Time Schedules’ list, and click ‘Edit’ button to edit the start and end time of this schedule. Delete a selected schedule item.
Save settings in this tab.
Discard all settings in this tab.
80 9.3.1.3 Audio For cameras that support audio, you can use this tab to decide if you wish to hear the audio captured by selected camera. Here are the descriptions of all setting items: Item Description Channel Select the channel number you wish to set. Mute Audio Check this box and the IP camera surveillance software will not play the audio captured by this camera. Record Video Check this box and the IP camera surveillance Only software will not record the audio captured by this camera. OK Save settings in this tab.
Cancel Discard all settings in this tab.
81 9.3.1.4 Motion­Triggered Recording With this function activated, only motions captured by the camera will be recorded, so you don’t have to waste hard disk storage space on images you don’t need to pay attention to. WARNING: For applications that security is highly concerned, it’s not
recommended to use this function since some tiny changes you may
need to know may not be able to trigger the camera and the camera
will not start recording.
Here are the descriptions of all setting items: Item Description Channel Select the channel number you wish to set. Enable Enable motion record function.
Disable Disable motion record function.
Recording Select the time duration that camera will Time record when a motion has been detected from dropdown menu in seconds. Invoke alarm Send an alarm when a motion has been 82 when motion is triggered Send mail when motion is triggered OK Cancel detected by the camera.
Send an email to a pre‐defined address when a motion has been detected by the camera. Save settings in this tab.
Discard all settings in this tab.
83 9.3.2 General Settings You can set system‐wide settings of this IP camera surveillance software in this menu. 9.3.2.1 General All general settings like file storage directory and recording spaces can be set here. Here are the descriptions of all setting items: 84 Item Data Directory Free Recording Space Max Video File Size Scan Time Cycle Recording OK Cancel Description Set the directory (folder) you wish to store the recorded video and captured image. You can click ‘Browse’ button to pick a directory in your hard disk. Displays remaining storage space.
Defines the maximum file size of every video file. When the size of file exceeds this value, IP camera surveillance software will open another file to record the video. Define the time period to pause between every camera switch when you activate ‘Scan’ function. You can decide the behavior when hard disk space is full: Disable: Do not overwrite recorded video files. Enable: Overwrite recorded video files. Save settings in this tab.
Discard all settings in this tab.
85 9.3.2.2 Email Setting If you want to use motion detection function and wish to get an email that contains the image captured by the camera, please setup your email related parameters here first. Here are the descriptions of all setting items: Item Description E‐Mail Subject Specify the subject of sending email.
Recipient Here lists all email addresses you set.
E‐Mail 86 Address New Click this button and you’ll be prompted to input the email address. Click ‘OK’ to save changes. Edit Select an email address from ‘Recipient E‐Mail Address’ box, and click ‘Edit’ to edit the email address. Delete Delete selected email address.
Sender E‐Mail Specify the email address of email sender.
Address SMTP Server Specify the IP address or host name of the SMTP server you wish to use. For most of ISPs they will only allow its subscriber to use their SMTP server, if you don’t know which SMTP server you should use, please refer to the setting of your email software or ask your ISP / network administrator. SMTP port Specify the port number of the SMTP server you wish to use here. By default (and the setting of most of SMTP servers) it’s ‘25’. SMTP Auth Select ‘Enable’ if your SMTP server requires authentication, select ‘Disable’ if it’s not required. If you don’t know if your SMTP server requires authentication, please refer to the setting of your email software or ask your ISP / network administrator. SMTP Input the SMTP account (username) of your Account SMTP server here. In most cases, it’s the same with your POP3 username (the one you used 87 SMTP Password OK Cancel to receive email). Please refer to the setting of your email software or ask your ISP / network administrator if you’re not sure about this. Input the SMTP password of your SMTP server here. In most cases, it’s the same with your POP3 password (the one you used to receive email). Please refer to the setting of your email software or ask your ISP / network administrator if you’re not sure about this. Save settings in this tab.
Discard all settings in this tab.
9.3.2.3 Security If you don’t want other people to access this IP camera surveillance software, you can set a password to protect it. You’ll need to input the password every time you wish to use this IP camera surveillance software: To set password, please use ‘Security’ tab in ‘General Options’ menu: 88 Here are the descriptions of all setting items: Item Description Enable Requires password authentication when this software starts. Disable Password authentication is not required when this software starts. Password Input the password you wish to use here.
Confirm Input the password you wish to use here Password again. 9.3.2.4 About 89 This tab shows the version number of the IP camera surveillance software you’re using. 90 9.4 Changing the Display Layout This IP camera surveillance software provides 8 kinds of display layout: Every layout displays different number of camera and camera arrangement, you can click the icon that presents a specific kind of layout, and the video displaying area will change accordingly. Layout style Displays the video of 1 camera only. 1: 1 Camera only Layout style 2: 4 Cameras Displays the video of up to 4 cameras. 91 Layout style 3: 6 Cameras Displays the video of up to 6 cameras.
Layout style 4: 8 Cameras Displays the video of up to 8 cameras. Layout style Displays the video of up to 9 cameras. 5: 9 Cameras Layout style Displays the video of up to 10 cameras. 6: 10 Cameras 92 Layout style Displays the video of up to 13 cameras. 7: 13 Cameras Layout style Displays the video of up to 16 cameras. 8: 16 Cameras 93 9.5 Full­Screen Mode If you want to use all available spaces on your monitor to display surveillance image, you can click ‘Full Screen’ button to switch display mode to full‐screen mode. To exit full‐screen mode, press ‘ESC’ key. 94 9.6 Scan If you have more than one camera configured, and you wish to switch the displaying image between cameras, you can click ‘Scan’ button to switch between all configured cameras. NOTE: If a camera is configured but disconnected, it will still be
displayed in a scan sequence (you’ll see nothing and you’ll see
‘Disconnected’ text displayed at the upper-left corner of display
image).
Click ‘Scan’ button once to activate scan function (scan icon will become blue ), click again to stop scanning (scan icon will become white ). 95 9.7 Zoom­In/Zoom­Out For cameras that support zoom‐in / zoom‐out function, you can use this function to see more objects that fall in the scope of camera’s view, or enlarge the image size of a certain object to see its detail. Please select a camera in video displaying area by clicking on its image, then click button to see more objects that fall in the scope of camera’s view, or click to enlarge the image size of a certain object to see its detail (Before zoom‐in, you may need to use PTZ buttons ‐ described in next section) to find an object you wish to see its detail). 96 9.8 PTZ For cameras that support pan ‐ tilt function, you can change the position that camera points to, to see different places that fall in the scope of camera’s view. Please select a camera in video displaying area by clicking on its image, and then click the directions you wish the camera to move to (total 8 directions available). Click ‘Home’ button ( ) to return to camera’s home (default) position. 97 9.9 Snapshot You can take a snapshot of selected camera and save it to ‘Snapshot’ sub‐folder of pre‐defined data directory. Click snapshot button once to take a snapshot; you can take as much snapshot as you want before hard disk is full. 98 9.10 Recording You can start video recording of selected camera manually by clicking ‘Start Recording’ button: When recording starts, you’ll see a message displayed in message displaying box like ‘1/1 10:00:00, Camera 2 Start Manual’, which means camera 1 starts recording manually on 1/1 at 10:00:00. To stop recording, click ‘Start Recording’ button again, and you’ll see a message displayed in message displaying box like ‘1/1 10:00:00, Camera 2 Stop Manual’. 99 9.11 Video Playback You can playback all recorded video by clicking this button. A new window will appear: You have to search the video file before you can play it. There are two kinds of video search: Time Search (search all videos file that falls in a specific period of time) and Motion Search (search all videos recorded by motion detection function and falls in a specific period of time). Please define the start and end date / time of the time period you wish to search, and then click ‘Search’ button (of ‘Time Search’ of ‘Motion’ Search’). All found videos will be displayed, select the video you wish to play and click ‘Play’ button to playback. 100 Chapter X: Appendix 10.1 Troubleshooting Please don’t panic when you found this IP Camera is not working properly. Before you send this IP Camera back to us, you can do some simple checks to save your time: Problem description Possible solution(s)
Can’t connect to IP Camera 1) Please check the IP address of IP Camera again.
2) Please make sure the network cable is correctly connected to your local area network. 3) Please make sure power cable is correctly connected to IP Camera. 4) Please make sure IP Camera is switched on (the LED lights on IP Camera will light up), if LED lights are not switched off by configuration menu (System ‐> Basic ‐> LED light). No IP Camera found 1) ‘Auto search’ function only works on IP Cameras located on local area network. No image 1) If the place where IP camera is installed is too dark, try to add some lights when possible. 2) Check if there’s anything covering the lens. 101 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1. Reorient or relocate the receiving antenna. 2. Increase the separation between the equipment and receiver. 3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio technician for help. FCC Caution This device and its antenna must not be co‐located or operating in conjunction with any other antenna or transmitter. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Any changes or modifications not expressly approved by the party responsible for compliance could void the authority to operate equipment. Federal Communications Commission (FCC) Radiation Exposure Statement This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 2.5cm (1 inch) during normal operation. Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) configurations with PCMCIA slot on the side near the center, as tested in the application for certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electrical and RF characteristics. Use in other devices such as PDAs or lap pads is not authorized. This transmitter is restricted for use with the specific antenna tested in the application for certification. The antenna(s) used for this transmitter must not be co‐located or operating in conjunction with any other antenna or transmitter. R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Bulgaria, Cyprus, Czech, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Turkey, and United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states: Iceland, Liechtenstein, Norway, and Switzerland. EU Countries Not Intended for Use None 102 Declaration of Conformity
We, Edimax Technology Co., Ltd., declare under our sole responsibility, that the
equipment described below complies with the requirements of the European R&TTE
directive (2006/95/EC).
Equipment :
Model No. :
1.3Mpx Wireless Network Camera
IC-3015Wn
Report No. :
EA161515 EH161515
L161515L356
ER161515AC
ER161515AI
The following European standards for essential requirements have been followed:
EN 50385:2002
EN 301 489-1 V1.8.1 (2008-04)
EN 301 489-17 V2.1.1 (2009-05)
ETSI EN 300 328 V1.7.1 (2006-10)
IEC 60950-1: 2005 (2nd Edition)
EN 60950-1: 2006+A11:2009
Edimax Technology Co., Ltd.
No. 3, Wu-Chuan 3rd Road,
Wu-Gu Industrial Area
New Taipei City 248, Taiwan (R.O.C)
Date of Signature
: Oct, 2011
Signature
:
Printed Name
: Albert Chang
Director
:
Edimax Technology Co., Ltd.
Title
103 Notice According to GNU General Public License Version 2 This product includes software that is subject to the GNU General Public License version 2. The program is free software and distributed without any warranty of the author. We offer, valid for at least three years, to give you, for a charge no more than the costs of physically performing source distribution, a complete machine‐readable copy of the corresponding source code. Das Produkt beinhaltet Software, die den Bedingungen der GNU/GPL‐Version 2 unterliegt. Das Programm ist eine sog. „Free Software“, der Autor stellt das Programm ohne irgendeine Gewährleistungen zur Verfügung. Wir bieten Ihnen für einen Zeitraum von drei Jahren an, eine vollständige maschinenlesbare Kopie des Quelltextes der Programme zur Verfügung zu stellen – zu nicht höheren Kosten als denen, die durch den physikalischen Kopiervorgang anfallen. GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110‐1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software‐‐to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author’s protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors’ reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The ‘“Program’“, below, refers to any such program or work, and a ‘“work based on the Program’“ means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term ‘“modification’“.) Each licensee is addressed as ‘“you’“. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep 104 intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine‐readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine‐readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 105 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty‐free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and ‘“any later version’“, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM ‘“AS IS’“ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 106 107 
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising