Table of Contents Chapter 1 Product Overview .................................................................................................................................................... 6 Key Features ............................................................................................................................................................................................ 7 Introduction ...................................................................................................
Spanning Tree Settings........................................................................................................................................................................... 45 Chapter 7 Wireless ................................................................................................................................................................... 46 System Properties ...............................................................................................................
SNMP Settings ....................................................................................................................................................................................... 80 CLI/SSH Settings ................................................................................................................................................................................... 83 HTTPS Settings.................................................................................................
Audio Detection ................................................................................................................................................................................... 126 Tampering Detection ............................................................................................................................................................................ 127 Event Action ......................................................................................................
Chapter 1 Product Overview 6
Introduction Key Features Deploy and manage with ease using EWS Series Wireless Management Switches. Advance Access Point mode with mesh network support. Dual Concurrent 2.4GHz and 5GHz architecture with max transfer rates of up to 300+867 Mbps. Internal 5dBi Omni-Directional MIMO antennas optimized for maximum RF performance. Backward compatible with IEEE802.11a/b/g/n wireless devices. Integrated Power over Ethernet (IEEE802.3af) for lowering deploying costs.
Introduction EnGenius Indoor Mesh Access Point Camera is a new concept of dual band concurrent, high power, high sensitivity and strong reliability for enterprise solutions. Easy setup and installation for combination of two products – Access point and IP camera, one PoE or DC power solve the power input, and single UI interface for all configurations.
System Requirements The following are the Minimum System Requirements in order to configure the device: Computer with an Ethernet interface or wireless network capability Windows OS (XP, Vista, 7, 10), Mac OS, or Linux-based operating systems Web-Browsing Application (i.e.
Applications Wireless LAN (WLAN) products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of WLANs: Difficult-to-Wire Environments: There are many situations where wires cannot be installed, deployed easily, or cannot be hidden from view.
Technical Specifications EWS1025CAM Standard 2.4GHz IEEE802.11b/g/n 5GHz IEEE802.11a/n/ac Antennas 4 x Internal 5dBi Omni-Directional Image Sensor Sony 2Megapixel 1920 x1080 Progressive Scan COMS sensor Lens Fixed Board Lens, f =2.8mm/F2.0, F.O.V=120 Degree(Diagonal) IR illuminator Interface 20 Meter Range 1 x 10/100/1000 Gigabit Ethernet Port 1 x Reset Button 1 x Power Connector 1 x Micro SDXC card slot LED Indicator 5GHz, 2.4GHz, Power, LAN, Mesh PoE Support IEEE802.
Physical Interface 5 1 2 4 6 3 7 9 8 1. LAN Port (802.3af PoE): Ethernet port for RJ-45 cable. 2. Power Connector: 12V DC IN for Power Adapter. 3. Ceiling Mount Hole: Using the provided mounting kit, the Access Point can be attached to a ceiling or wall. 4. Micro SD card slot: Supported SDXC card for local storage. 5. Reset Button: Press and hold for over 10 seconds to reset to factory default settings. 6. LED Indicators: LED lights for Mesh, WLAN 5GHz, WLAN 2.4GHz, LAN, and Power. 7.
9. IR illuminator: 20 meter infrared for low lux environment.
Chapter 2 Before You Begin 14
Before You Begin This section will guide you through the installation process. Placement of the EnGenius Access Point is essential to maximize the Access Point’s performance. Avoid placing the Access Point in an enclosed space such as a closet, cabinet, or stairwell. Considerations for Wireless Installation The operating distance of all wireless devices can often not be pre-determined due to a number of unknown obstacles in the environment in which the device is deployed.
Computer Settings Windows XP/Windows 7 In order to use the Access Point, you must first configure the TCP/IPv4 connection of your Windows OS computer system. 1. Click the Start button and open the Control Panel. Windows XP Windows 7 2a. In Windows XP, click on Network Connections.
2b. In Windows 7, click View network status and tasks in the Network and Internet section, then select Change adapter settings. 3. Right click on Local Area Connection and select Properties. 4. Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
5. Select Use the following IP address and enter an IP address that is different from the Access Point and Subnet mask, then click OK. Note: Ensure that the IP address and Subnet mask are on the same subnet as the device. For example: EWS1025CAM IP address: 192.168.1.1 PC IP address: 192.168.1.2 – 192.168.1.255 PC Subnet mask: 255.255.255.
Apple Mac OS X 1. Go to System Preferences (it can be opened in the Applications folder or by selecting it in the Apple Menu). 2. Select Network in the Internet & Network section. 3. Highlight Ethernet. 4. In Configure IPv4, select Manually. 5. Enter an IP address that is different from the Access Point and Subnet mask, then click OK. Note: Ensure that the IP address and Subnet mask are on the same subnet as the device. For example: EWS1025CAM IP address: 192.168.1.1 PC IP address: 192.168.1.2 – 192.168.1.
Hardware Installation 1. Ensure that the computer in use has an Ethernet Controller port (RJ-45 Ethernet Port). For more information, verify with your computer’s user manual. 2. Connect one end of the Category 5e Ethernet cable into the RJ-45 port of the Access Point and the other end to the RJ-45 port of the computer. Ensure that the cable is securely connected to both the Access Point and the computer. 3.
Mounting the Access Point Using the provided hardware, the Access Point can be attached to a ceiling or wall. To attach the Access Point to a ceiling or wall using the mounting bracket: 1. Attach the mounting bracket to the wall or ceiling using the provided wall/ceiling mounting hardware kit. 2. Insert the provided short screws into the bottom cover of the Access Point. Leave enough of the screws exposed to ensure that the unit can be attached to the mounting bracket.
3. Mount the Access Point on the mounting bracket by rotating the unit clockwise about 90 degrees to secure it in place. Attaching the Access Point to a ceiling using the provided T-Rail connectors: 1. Attach the T-Rail connectors to the bottom cover of the Access Point using the provided short screws. Note: Two sizes of T-Rail connectors are included in the mounting hardware kit: 15/16in (2.38cm) and 9/16in (1.43cm).
Chapter 3 Configuring Your Access Point 24
Configuring Your Access Point This section will show you how to configure the device using the web-based configuration interface. Default Settings Please use your Ethernet port or wireless network adapter to connect the Access Point. IP Address 192.168.1.1/192.168.1.
Web Configuration 1. Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.1.1. Note: If you have changed the default LAN IP Address of the Access Point, ensure you enter the correct IP Address. 2. The default username and password are: admin. Once you have entered the correct username and password, click the Login button to open the web-based configuration page. 3. For the first time of login, you will be informed to download and install “WebCMS”.
If prompted with the following question, click on Save (Internet Explorer). Save the downloaded file.
Once download is completed, you MUST close all the browsers before install WebCMS. Double click on WebCMS to install the program. You may not have noticed, the installation is very fast, it only takes a few seconds for WebCMS to be installed. When installation is completed, open the browser and login into the camera again. You should be able to see the camera viewer in live as shown below. If you do not see the viewer that means you did not install WebCMS properly or try login using other browsers.
NOTE: If you are seeing grey color in the viewer, it is because the camera has detected insufficient of light in the room and enabled night vision mode automatically. If you point your camera to a brighter area, you should be able to see it switched to normal color mode. Try a few places to get a feeling on how it works. If listening closely, you may hear the click sound from the camera when night vision is switched on and off. 4. If successful, you will be logged in and see the Access Point User Interface.
Chapter 4 User Interface 30
User Interface The User Interface section contains the following options: • Navigation Panel • Live View Management The following sections describe these options.
The Navigation Panel is located at the top-right corner of the page.
Live View Management The Live View Management menu is located at the right side of the page. There are two streams running concurrently: Stream1 (1920x1080) and Stream2 (640x360). Stream1 has the higher resolution than stream2. Stream2 serves lower resolution for mobile devices which has smaller screens. You can preview each stream at real time by selecting it from the list. This opens the local folder where the real time captured images and clips are stored.
This switch only applies to resolution 640 x 360. When enabled, the preview image will switched to 1:1 mode. By default the image will expand and fill the view screen if the actual image is smaller than the view. This switch will hide the browser and expand the view to full screen. You can press ESC button to cancel the full screen mode. ePTZ display the digital zoom in for the region of interest, use your mouse to move the green window at the left bottom to the area you intend to monitor.
This button takes a snap-shot on the real time view and store the image in the local folder. Toggle this button to start recording movie clip at real time. Click on the button to start recording. Please note that when icon changed to blue icon the camera is recording. To stop recording, simply click the button again. Toggle this button to turn PC audio from the camera ON and OFF. The default is ON, click the button to turn it ON; the icon should change to 35 to signify OFF state.
Chapter 5 Access Point Settings 36
Overview The Overview section contains the following options: • Device Status • Connections • Real Time The following sections describe these options. Device Status Clicking the Device Status link under the Overview menu shows the status information about the current operating mode.
• The Memory Information section shows system memory information such as used and Total available, Free, Cached and Buffered The LAN Information section shows the Local Area Network settings such as the LAN IP Address, Subnet mask, Gateway, DNS Address, DHCP Client, and STP status. The Wirelesss LAN Information 2.4 GHz/5GHz section shows wireless information such as Operating Mode, Frequency, and Channel.
The UID/DDNS section shows each device is distributed with an exclusive unique identification (UID)/DDNS. You can find the default UID/DDNS shown here. Connections Clicking the Connections link under the Overview menu displays the list of clients associated to the Access Point’s 2.4GHz/5GHz, along with the MAC address, TX, RX and signal strength for each client. Clicking Kick in the Block column removes this client. Click Refresh to refresh the Connection List page.
Realtime Clicking the Realtime link under the Overview menu displays CPU load, Traffic and Connections CPU Load: 3 minutes CPU loading percentage information, it displays current loading, average loading and peak loading status. Left bar is loading percentage; button is time tracing. Interval is every 3 seconds. Realtime Traffic (kb/s): 2.4GHz and 5GHz and Ethernet port inbound and outbound traffic by current, average and peak time.
Realtime Connection (Pkts): Overview on current active network connections. It displays UDP and TCP packets information and other connection status. UDP connections curve is in blue; TCP connection curve is in green; others curve is in red. Below of chart shows connections source and destination.
Chapter 6 Network 43
Basic This page allows you to modify the device’s IP settings and the Spanning Tree settings. Enabling Spanning Tree protocol will prevent network loops in your LAN network. IPv4 Settings IP Network Setting: Select whether the device IP address will use the static IP address specified in the IP Address field or be obtained automatically when the device connects to a DHCP server. IP Address: The IP Address of this device. IP Subnet Mask: The IP Subnet mask of this device.
Spanning Tree Settings Status: Enables or disables the Spanning Tree function. Hello Time: Specify Bridge Hello Time, in seconds. This value determines how often the device sends handshake packets to communicate information about the topology throughout the entire Bridged Local Area Network. Max Age: Specify Bridge Max Age, in seconds. If another bridge in the spanning tree does not send a hello packet for a long period of time, it is assumed to be inactive.
Chapter 7 Wireless 46
System Properties Device Name: Enter a name for the device. The name you type appears in SNMP management. This name is not the SSID and is not broadcast to other devices. Region: Select Region to conform to local regulations. Band Steering: Send 802.11n client to the 5GHz band, where 802.11b/g clients cannot go and leave 802.11b/g clients in 2.4GHz to operate their slower rate. Band Steering works within the Access Point by directing 5GHz-capable clients to the band.
Operation mode The EWS1025CAM supports five operating modes:Access Point, Client Bridge, WDS AP, WDS Bridge, and WDS Station. 2.4GHz Access Point Client Bridge WDS AP WDS Bridge WDS Station Access Point ● ● ● ● ● Client Bridge ● X ● X X WDS AP ● ● ● ● ● WDS Bridge ● X ● X X WDS Station ● X ● X X 5GHz This page displays the current status of the Wireless settings of the EWS1025CAM.
2.4G/5G Wireless Network (Access Point / WDS AP mode) Wireless Mode Wireless mode supports 802.11b/g/n mixed mode in 2.4G and 802.11ac/a/n mixed mode in 5G. Channel HT Mode Scroll down this list to select bandwidth for operating under a frequency band. The default channel bandwidth is 20 MHz on 2.4GHz frequency radio and 40 MHz on 5GHz frequency radio. Considering the different applications, users can decide to implement a channel bandwidth to fulfill real applications.
Channel / Frequency Select the channel and frequency appropriate. Auto Check this option to enable auto-channel selection. RTS/CTS Threshold Threshold packet size for RTC/CTS. A small number causes RTS/CTS packet to be sent more often and consumes more bandwidth. Client Limit Limits the total number of clients on this radio. Once setting the ceiling of client numbers, the maximum associated client devices will be restricted at this number. Aggregation Merges data packets into one packet.
2.4GHz/5GHz SSID Profile Under Wireless Settings, you can edit the SSID profile to fit your needs. Click Edit under the SSID you would like to make changes to.
Enable: Check this option to enable this profile. SSID: Specifies the SSID for the current profile. Security: Displays the Security Mode the SSID uses. You can click Edit to change the security mode. For more details, see the next section. Hidden SSID: Check this option to hide the SSID from clients. If checked, the SSID will not appear in the site survey. Client Isolation: Check this option to prevent communication between client devices. VLAN Isolation: Check this option to enable VLAN Isolation feature.
Wireless Security The Wireless Security section lets you configure the Access Point’s security modes: WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA-Enterprise, WPA2-Enterprise and WPA Mixed Enterprise. It is strongly recommended that you use WPA2-PSK. Click on the Edit button under Wireless Settings next to the SSID to change the security settings. WEP Auth Type: Select Open System or Shared Key. Input Type: ASCII: Regular Text (Recommended) or HEX: Hexadecimal Numbers (For advanced users).
WPA-PSK/WPA2-PSK (Pre-Shared Key) Encryption: Select the WPA/WPA2 encryption type you would like to use. Available options are Both, TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard). Please ensure that your wireless clients use the same settings. Passphrase: Wireless clients must use the same Key to associate the device. If using ASCII format, the Key must be from 8 to 63 characters in length. If using HEX format, the Key must be 64 HEX characters in length.
Encryption: Select the WPA/WPA2 encryption type you would like to use. Available options are Both, TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard). Please ensure that your wireless clients use the same settings. Group Key Update Interval: Specify how often, in seconds, the group key changes. Radius Server: Enter the IP address of the Radius server. Radius Port: Enter the port number used for connections to the Radius server.
Wireless MAC Filter Wireless MAC Filter is used to allow or deny network access to wireless clients (computers, tablet PCs, NAS, smart phones, etc.) according to their MAC addresses. You can manually add a MAC address to restrict permission to access the Access Point. The default setting is: Disable Wireless MAC Filter. ACL (Access Control List) Mode: Determines whether network access is granted or denied to clients whose MAC addresses appear in the MAC address table on this page.
Traffic Shaping Traffic Shaping regulates the flow of packets leaving an interface to deliver improved Quality of Service. Enable Traffic Shaping: Select to Enable or Disable Wireless Traffic Shaping. Download Limit: Specifies the wireless transmission speed used for downloading. Upload Limit: Specifies the wireless transmission speed used for uploading. Per User: Check this option to enable wireless traffic shaping per user function.
Fast Roaming Enable the function to serve mobile client devices that roam from Access Point to Access Point. Some applications running on Client devices require fast re-association when they roam to a different Access Point Please enter the settings of the SSID and initialize the Security mode to WPA enterprise, as well as to set the Radius Server firstly. Users can enable the Fast Roaming and implement the advanced search.
WDS Link Settings Using the WDS (Wireless Distribution System) feature will allow a network administrator or installer to connect to Access Points wirelessly. Doing so will extend the wired infrastructure to locations where cabling is not possible or inefficient to implement. Note: Compatibility between different brands and models of Access Points is not guaranteed. It is recommended that the WDS network be created using the same models for maximum compatibility.
Security: Select None or AES from the drop-down list. AES Passphrase: Enter the Key Values you wish to use. Other Access Points must use the same Key to establish a WDS link. MAC Address: Enter the Access Point’s MAC address to where you want to extend the wireless area. Mode: Select to disable or enable from the drop-down list. Save: Click Save to confirm the changes.
Guest Network The Guest Network function allows administrators to grant Internet connectivity to visitors or guests while keeping other networked devices (computers and hard drives) and sensitive personal or company information private and secure. Enable SSID: Select to Enable or Disable SSID broadcasting. SSID: Specify the SSID for the current profile. This is the name visible on the network to wireless clients. Security: You can use None or WPA-PSK / WPA2-PSK security for this guest network.
After enabling Guest Network in the SSID Config page, assign an IP Address, Subnet Mask and DHCP server IP address range for this Guest Network. Manual IP Settings IP Address: Specify an IP Address for the Guest Network Subnet Mask: Specify the the Subnet Mask IP Address for the Guest Network Automatic DHCP Server Settings Starting IP Address: Specify the starting IP Address range for the Guest Network. Ending IP Address: Specify the ending IP Address range for the Guest Network.
RSSI Threshold The RSSI value can be adjusted to allow more clients to stay associated to this AP. Note that setting the RSSI value too low may cause wireless clients to reconnect frequently. RSSI Threshold: Enable the RSSI Threshold feature by ensuring that each client is served by at least one Access Point at any time.
Management VLAN Settings This section allows you to assign a VLAN tag to the packets. A VLAN is a group of computers on a network whose software has been configured so that they behave as if they were on a separate Local Area Network (LAN). Computers on VLAN do not have to be physically located next to one another on the LAN. Status: If your network includes VLANs and if tagged packets need to pass through the Access Point, select Enable and enter the VLAN ID. Otherwise, click Disable.
Chapter 8 DDNS 65
You must Enable EnGenius Cloud first and then choose the Type. A key part about EnGenius Cloud Service is DDNS. Dynamic DNS (DDNS) is a type of DNS that works with dynamic IP address. DDNS keeps update its mapping regularly and ensures a consistent matching so that your device can be accessed over the Internet using a fixed DDNS name. You can either use the default EnGenius DDNS Service or other 3rd party Service you prefer.
Alias DDNS Name: You may find that your DDNS is too difficult to remember. EnGenius provides free DDNS name registration as long as the alias is not yet been taken other EnGenius product users. You can check the availability by clicking on the button Availability Check for verification. In this example, “superman.engeniusddns.com” is available. That is, when the setting is activated, both DDNS name “superman.engeniusddns.com” and “0e95c28.engeniusddns.com” can be used to access this camera.
Chapter 9 UPnP 68
Universal Plug and Play (UPnP) allows the other device to detect the presence of the camera so that communication becomes possible. You should enable UPnP if you wish your camera to be recognized by your router. UPnP Traversal makes camera remote access over the Internet possible using camera DDNS name. You won’t be able to access the camera if you disable UPnP feature. Please keep it Enable if you are not sure.
Chapter 10 Service Port 70
The default setting is as follows. This is only reserved for advanced users who want to keep certain ports for other particular services. Changing the ports will result in unexpected result. Unless necessary, please keep the default setting.
Chapter 11 Mesh 72
Simple to deploy and create a mesh network by the EWS controller or EzMaster in minutes, but for standalone mode without these two applications, user needs to configure the same settings of Mesh network in each device, once EWS1025CAM plugged into any power source, the EnGenius mesh devices automatically optimizes routes between wireless mesh devices and creates a truly adaptive mesh infrastructure with all system.
Settings Each device must have the same settings in this setting page. Note: If you have changed the settings in Network Wireless page, please make sure all the settings must be the same in each device. Mesh: Enable or Disable the mesh function, system will save the settings even mesh function is disable. Operation Mode: The Mesh AP mode is mesh point with wireless AP function. And system will auto disable the wireless AP function when user selected the Mesh Point mode.
Mesh Device Name: You can click the hyper link to modify the Mesh device name from wireless setting page of device name. Mesh Band: Select the 2.4GHz or 5GHz for the mesh backbone connection. Mesh ID: The mesh ID should be maximum up to 8 characters in numbers 0 ~ 9. Password: The mesh password should be maximum up to 12 characters. Mesh RSSI: Enter the Mesh RSSI in order to determine the connection procedure which the current wireless link will terminate.
All the connected Mesh nodes will be displayed in this page. Node: It shows the device name and MAC address. Type: There are two types of the node. The Root node uplink to the gateway by wire, and connect with other mesh node by wireless simultaneously. Hops Count: The hops count refers to the number of intermediate devices through which data must pass between the Mesh node itself and Root node.
Link Status The Mesh network view is an overview for all mesh nodes. Mesh View: Mouse over on any Mesh node (black) for the linking status which is linking to other Mesh nodes (blue) with green line. Unreachable Mesh Node(s): The nodes which can't be connected to the mesh network, due to the weak signal detected by neighbor nodes. RSSI: The node is not allowed to link with mesh if its current signal strength is continuously lower than the Mesh RSSI which is in the mesh settings page.
This page allows you to analyze the connection quality of a mesh node to other mesh node in the mesh network. Trace Route This page allows you to analyze the routing table to a target from a mesh node to other mesh node in the mesh network. Throughput This page allows you to analyze the throughput from a mesh node to other mesh node in the mesh network.
Chapter 12 Management 79
Controller Settings Adding EWS1025CAM to ezMaster Device Inventory, you must first bind the AP to ezMaster's Device Inventory by ‘registering’ the device. You can manually redirecting each AP to ezMaster, or skip this section if you are managing only local devices. You can test the ezMaster Device Inventory by IP address, and get the connection status between EWS1025CAM and ezMaster Device Inventory.
Status: Enables or Disables the SNMP feature. Contact: Specifies the contact details of the device. Location: Specifies the location of the device. Community Name (Read Only): Specifies the password for the SNMP community for read only access. Community Name (Read/Write): Specifies the password for the SNMP community with read/write access. Trap Destination Address: Specifies the port and IP address of the computer that will receive the SNMP traps.
Port: Displays the port number. Trap Destination Community Name: Specifies the password for the SNMP trap community. SNMPv3 Status: Enables or Disables the SNMPv3 feature. User Name: Specifies the username for the SNMPv3.feature Auth Protocol: Select the Authentication Protocol type: MDS or SHA. Auth Key: Specify the Authentication Key for authentication. Priv Protocol: Select the Privacy Protocol type: DES. Priv Key: Specifies the privacy key for privacy. Engine ID: Specifies the Engine ID for SNMPv3.
CLI/SSH Settings Most users will configure the device through the graphical user interface (GUI). However, for those who prefer an alternative method there is the command line interface (CLI). The CLI can be access through a command console, modem or Telnet connection. For security’s concern, you can enable SSH (Secure Shell) to establish a secure data communication. CLI Status: Select Enable or Disable to enable or disable the ability to modify the Access Point via a command line interface (CLI).
HTTPS Settings Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications.
Email Alert The Access Point will send email alerts when configurations have been changed. Status: Check Enable to enable Email Alert feature. From: Enter the address to show as the sender of the email. To: Enter the address to show as the receiver of the email. Subject: Enter the subject to show as the subject of the email. Email Account Username/Password: Enter the username and password required to connect to the SMTP server. SMTP Server/Port: Enter the IP address/domain name and port of the SMTP server.
Apply: Click Apply to save the changes. Date and Time Settings This page allows you to set the internal clock of the Access Point. To access the Date and Time settings, click Time Zone under the Management tab on the side bar. Manually Set Date and Time: Manually specify the date and time. Synchronize with PC: Click to synchronize the Access Point’s internal clock with the computer’s time.
WiFi Scheduler Use the schedule function to reboot the Access Point or control the wireless availability on a routine basis. The Schedule function relies on the GMT time setting acquired from a network time protocol (NTP) server. For details on how to connect the Access Point to an NTP server, see Date and Time Settings. Auto Reboot Settings You can specify how often you would like to reboot the Access Point. Status: Enables or disables the Auto Reboot function.
WiFi Scheduler Status: Enables or disables the WiFi Scheduler function. Wireless Radio: Select 2.4GHz or 5GHz* to use WiFi Schedule. SSID Selection: Select a SSID to use WiFi Schedule. Schedule Templates: There are 3 templates available: Always available, Available 8-5 daily and Available 8-5 daily except weekends. Select Custom schedule if you want to set the schedule manually. Schedule Table: Set the schedule manually. *5GHz radio settings only available for dual radio models.
Tools This section allows you to analyze the connection quality of the Access Point and trace the routing table to a target in the network. Ping Test Parameters Target IP/Domain Name: Enter the IP address or Domain name you would like to search. Ping Packet Size: Enter the packet size of each ping. Number of Pings: Enter the number of times you wish to ping. Start: Click Start to begin pinging target device (via IP).
Traceroute Parameters Target IP/Domain Name: Enter an IP address or domain name you wish to trace. Start: Click Start to begin the trace route operation. Stop: Halts the traceroute test.
Nslookup Parameters Target IP/Domain Name: Enter an IP address or domain name you wish to trace. Start: Click Start to begin the Nslookup operation.
Speed Test Parameters Target IP/Domain Name: Enter an IP address or domain name you wish to run a Speed Test for. Time Period: Enter the time in seconds that you would like the test to run for and in how many intervals. Start: Starts the Speed Test. IPv4: The Access Point uses IPv4 port 5001 for the speed test.
LED Control This section allows you to control the LED control functions: Power status, LAN interface and 2.4GHz/5GHz/Mesh WLAN interface. Click Apply to save the settings after selecting your choices from the boxes.
Device Discovery Under Device Discovery, you can choose for the Access Point to automatically scan for local devices to connect to. Click Scan to begin the process.
Chapter 13 System Manager 95
Account Setting This page allows you to change the username and password of the device. There are three types of the account settings: 1. Web Account By default, the username is admin and the password is admin. The password can contain from 0 to 12 alphanumeric characters and is case sensitive. 2. Onvif Account By default, the username is onvif and the password is admin. The password can contain from 0 to 12 alphanumeric characters and is case sensitive. 3.
Apply: Click Apply to save the changes. Note: it is highly recommended that you change your password to something more unique for greater security. Push Message Mobile List Here will list the devices which enable the feature of push message on this camera. When an event triggered, camera will send the message to all the devices in this list. You can click “Delete” to disable the feature of the mobile device.
Firmware Upgrade This page allows you to upgrade the Firmware of the Access Point. To Perform the Firmware Upgrade: 1. Click the Browse… button and navigate the OS File System to the location of the Firmware upgrade file. 2. Select the upgrade file. The name of the file will appear in the Upgrade File field. 3. Click the Upload button to commence the Firmware upgrade. Note: The device is unavailable during the upgrade process and must restart when the upgrade is completed.
Backup/Restore This page allows you to save the current device configurations. When you save the configurations, you can also reload the saved configurations into the device through the Restore New Settings from a file folder. If extreme problems occur, or if you have set the device incorrectly, you can use the Reset button in the Reset to Default section to restore all the configurations of the device to the original default settings.
User Setting Back Up Setting as Default: Click Backup to backup the user settings you would like to use as the default settings. Restore to User Default: Click Restore to restore the Access Point to user’s default settings.
Reset/Reboot In some circumstances, you may be required to force the device to reboot. Click on Reboot the Device to reboot the device. System Log This page allows you to setup the System Log and local log functions of the Access Point. Click Log under the Systems Manager tab to open up the System Log page.
Status: Enables or disables the System Log function. Log Type: Select the Log Type mode you would like to use. Remote Log: Enables or disables the Remote Log feature. If enabled, enter the IP address of the Log you would like to remote to. Log Server IP Address: Enter the IP address of the log server. Apply: Click Apply to save the changes.
Chapter 14 Camera OverView 103
Camera Status Status page displays the detail video streaming information on the page including Resolution, Video Codec, Frame Rate, Ethernet Bit Rate, WiFi Bit Rate and Audio Codec.
PC Storage Path Folder Path: click “Browse” to change the path Snapshot File Type: support image format JPG, PNG & BMP Recording File Type: support format AVI & MP4 Compression rate comparison (High to Low): JPG > PNG > BMP MP4 > AVI You should consider keeping the default setting because it reduces image or clip file size.
Chapter 15 Media 106
Video Enable: it is recommended that you enable Time Stamp and Video Title; the timestamp will show on the top-left corner of your video as shown below.
Camera You can get better quality by tuning the lighting condition of the camera. For example, in a dark room you may want to set the Brightness higher to generate clearer result. When directly facing an outdoor window (too much light) you may want to lower the Brightness a bit. There may be different settings under different circumstance; therefore, you should tune the setting if the image quality has become too low to serve its purpose.
Light setting Brightness Contrast 109
Sturation Sharpness 110
De-noise Please note that some of the effects will be more obvious in higher resolution at real time. Flicker Control The supported options are: 60Hz & 50Hz Flicker Control is an anti-flicker feature setting. AC lamp can cause a flicker effect, which is a consequence of the AC power frequency (50 or 60 Hz). As the light can change from picture to picture, causing light flicker. This will lead to inconsistent light source between each snapshot.
Mirror Support Mirrors: None, Mirror, Flip and Both There are times that the camera will have to be mounted upside down for sideways. That is, the view become difficult to monitor when it is upside down. The Mirror setting does not reflect on the preview at real time (unlike lighting condition settings). Therefore, you have to click on Apply to see the result. The following examples compare none with a chosen mirror effect.
Flip (Vertical) None Flip Both (Horizontal and Vertical) None Both 113
Day/Night Mode This controls Night Vision ON and OFF. Auto: auto detect light sufficiency and switch between Day and Night automatically. Day: force the camera to turn OFF Night Vision. Night: force the camera to turn Night Vision ON.
Advance Exposure Settings Mode: Manual, Indoor, Outdoor For regular users, please choose indoor or outdoor, if you are not sure about the terms and behavior, the default values will the preconfigured. The areas are grey out for preconfigured settings when you choose Indoor or Outdoor.
Manual Choose Manual if you would like to fine tune some of the settings that suits your application. Please be noted that these settings may have impacts on the image quality and performance.
Privacy Mask Choose Enable if you would like to put certain areas in private. Please use selected window to hide certain area for privacy purpose.
Audio Status If you audio is important to what you are monitoring, you need to set the audio status to Enable. So that the microphone can pick up sounds in the environment. On the other hand, if audio is not necessary (for instance an open space with a lot of noises), you are advised to disable the audio to reduce the clips file size. The default sample rate is 8k, and the bit rate is 16 bit. Input Gain: setting the sensitivity of the microphone.
Chapter 16 Event Management 119
Event Control This camera supports many smart features that allow you to utilize the camera in many application scenarios. This section will introduce each of them in detail. When camera detects an event that matches the predefined condition an event will be triggered and proceed with the defined actions; for instance, taking snapshots or recording videos for the specified length of time and interval.
. Enable/Disable the event control Schedule to set the camera to record video regularly based on a predefined schedule. Time of day can specify the time range for each schedule. Trigger Type by Time or Detectors, if you select the detectors, it can be trigger by Motion detection, Audio detection or Tampering detection. Event Notification can send the message to user when event triggered, you can select Push message, E-mail and VMS at the same time.
Record to SD Card, Network Storage or FTP, please remember to setup and enable the correlate settings of Network Storage and FTP. Snapshot to SD Card, Network Storage, FTP or E-Mail, please remember to setup and enable the correlate settings of Network Storage, FTP, E-mail.
Motion Detection Enable: it is recommended that you enable Time Stamp and Video Motion Detection Window is a hot zone that the camera analyzes for motion (image changes). When a motion is detected within the zone an event will be triggered.
When the window is selected, use your mouse to move the window to the area you intend to monitor. There can be 3 windows at the most. The Windows are differentiated by color; Window 1 is Green, Window 2 is Red and Window 3 is Blue. Video OSD Prompt displays the warning on the top lift of the live view page when motion triggered. Uncheck the window to remove the window from the view.
Therefore, you can have a combination of three different detection window sizes.
Audio Detection Sensitivity Level: 0% to 100% (with 100% being the most sensitive) Similar to motion detection, high sensitivity will trigger events more often than low sensitivity and produce more snapshots or videos. However, over-sensitive events will fill up the storage very quickly. Even if you have unlimited storage space, large amount of files can become a problem when you need to search through each of the files to find what you are really looking for.
Tampering Detection Tamper detection is a setting within your IP camera that will send you an alert when the camera is tampered with. Once an action has been detected, whether it’s someone trying to knock the camera down or blocking its view, the alert lets you know to log into the actions to see what happened. Video OSD Prompt displays the warning on the top lift of the live view page when motion triggered.
Event Action This page provides Event-related settings. Event Action/Buffer Duration until Next Event: can set 20sec(s), 30sec(s), 1min(s), 5min(s), 10min(s), if you set 20sec(s) for this item, system will ignore any trigger during this 20sec(s). Event Snapshot/Snapshot Duration: can set 10sec(s), 20sec(s), if you set 10sec(s) for this item, system will send a snapshot in every 10sec(s). Event Recording Stream Type: H.264 (1920x1080) or H.
Note: If setting Buffer Duration Until Next Event to 30 seconds, the camera will keep recording for 30 seconds when event is triggered. In this case, if the Video Length is 10 seconds, then 3 files will be generated for single instance of event. If Video Length is 30 seconds, then only 1 file will be generated. Please note that pre-event buffer will extend the length of the video clip for the chosen extra length of time.
Chapter 17 Event Server 130
Network Storage It is required for users to configure Event Server settings before setting camera Event or Schedule Recording. You will have to tell where the captured images or clips are going to be stored. The following concept diagram depicts the flow of the image file when and when captured. The file is stored at one of the predefine storage locations. Network Storage and FTP are required to have existing servers ready for upload.
NFS (Network File System) Server: IP address of the NFS server Path: enter the initial path if applicable Folder Size: storage allocated for the camera; the default value 0 signifies infinity. Overwrite: when the defined folder is full, the oldest files will be overwritten to accommodate the new one. Click Apply when done.
SAMBA Server: IP address of the SAMBA server Path: enter the initial path if applicable User Name: username for accessing SAMBA server Password: password for accessing SAMBA server Folder Size: storage allocated for the camera; the default value 0 signifies infinity. Overwrite: when the defined folder is full, the oldest files will be overwritten to accommodate the new one. Click Test to verify the connection with the server using the username and password. Click Apply when done.
FTP(File Transfer Protocol) Server: IP address of the FTP server Port: the FTP server port; default 21 User Name: username for accessing FTP server Password: password for accessing FTP server FTP Path: enter the initial path if applicable Click Test to verify the connection with the server using the username and password.
E-Mail EWS1025CAM allows camera to send captured images to the predefined email box to notify about an event or alarm. SMTP is an email sender’s server. You need to check whether your email service provider supports SMTP and obtain the required information for this setting. Email Server Provider: supported Gmail, Yahoo and Hotmail. SSL/TSL: select the type of the authentication as Transport Layer Security (TLS) protocol or Secure Sockets Layer (SSL) protocol SMTP Server: enter the SMTP server address (e.g.
Chapter 17 Storage Info 136
Storage Info System will display the storage information on this page; it includes the network storage status, total size and available size. User can click the “Refresh” button to get the latest information of these information. It depends on different browsers, user can double click the mouse on the records of .avi or .jpg file to save and view the video or snapshot. This camera supports MicroSD card slot. Please be careful when choosing the SD card type.
You can browse through the folder like any other file manager by clicking on the folder name. Click on the files to view it directly as shown below.
Appendix 139
Appendix A - FCC Interference Statement Federal Communication Commission Interference Statement FCC Caution: IMPORTANT NOTE: Radiation Exposure Statement 140
Appendix B - CE Interference Statement Europe – EU Declaration of Conformity 142
0560 143