Wireless-N Internet Home Monitoring Camera User Guide Model: WVC80N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 4 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Bottom Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Appendix F: Regulatory Information 46 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Safety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Wireless-N Internet Home Monitoring Camera. The Camera sends live video through the Internet to a web browser anywhere in the world! This compact, self-contained unit lets you keep an eye on your home, your kids, your workplace—whatever’s important to you. Front Panel Power LED WARNING: Resetting the Camera will erase all of your settings, such as encryption information, and replace them with the factory defaults.
Installing and Using the Camera Utility Chapter 2 Chapter 2: Installing and Using the Camera Utility 4. The Choose Destination screen appears. Click Browse and choose the folder where you would like the Utility installed. Click Next. Overview This chapter will instruct you on how to install and use the Camera Utility. The Utility allows you to easily view and record the Camera’s video. If another Internet Camera Utility is already installed, you should uninstall it before installing this Camera Utility.
Chapter 2 Installing and Using the Camera Utility Using the Camera Utility for the First Time Menu Icons The Camera Utility starts up automatically after the Utility is successfully installed. To set up your first camera: The utility has three menu icons in the upper left corner: LiveView, View Recordings, and Setup. 1. Click the Setup window. icon in the upper left corner of the 2. The Cameras tab is displayed. Select your Camera from the Automatically add cameras list and click Add to my list.
Chapter 2 Installing and Using the Camera Utility Viewing Area Multiple-Camera Layouts The viewing area takes up most of the LiveView window. The viewing area can have four different layouts, with video windows for one, four, six, or nine Cameras. The layout is selected using the video layout controls described in “Video Layout’” below. In a multiple-Camera layout, one of the video windows is always outlined in green. This indicates the currently selected Camera.
Chapter 2 Installing and Using the Camera Utility Controls When recording ends, the icon reverts to its original state. The video controls are located along the right edge of the LiveView window in the Controls section. Recording In Progress No Recording In Progress ** This option will only be selectable when the MPEG-4/ MJPEG Setting is set to Fixed Quality. This setting is found in the Advanced Configuration > Image screen of the Camera’s Web-based Utility.
Chapter 2 Installing and Using the Camera Utility The controls and their functions are described below. Video Playback Control Function The section at the bottom of the View Recordings window is used to locate video for playback. Play/Pause Click this button to toggle the video between play and pause. Playback Speed Click and drag the wheel clockwise to increase the speed of the video playback, or counterclockwise to decrease the speed of the video playback.
Chapter 2 Installing and Using the Camera Utility My Camera List Setup > Recording Options The My camera list section of the Setup > Cameras screen contains a list of all Cameras that have been added (up to 9). Click on the Recording Options tab to set the recording schedule for a network Camera. Camera Name Displays the name of the Camera. Selecting a Camera on this list will display its details in the Camera Details section of the screen.
Installing and Using the Camera Utility Chapter 2 To delete a scheduled recording, check the box to the left of the recording, and click Delete. To delete all scheduled recordings, check the box in the upper left corner of the table and click Delete. Memory Requirements for Video Recordings You may find it helpful to know how much memory is required to hold a video recording.
Advanced Configuration with the Web-based Utility Chapter 3 Chapter 3: Advanced Configuration with the Web-based Utility •• Help – Select this tab to display the Help screen. Go to the “Help” section for more information. •• Exit – Select this tab to close the Utility. View Video Follow these instructions to view the Camera’s video. Overview 1. Click the View Video tab on the Welcome screen. Use the Camera’s Web-based Utility to access and alter its settings.
Chapter 3 Advanced Configuration with the Web-based Utility Resolution (cycles through 1x, 2x, and 4x). Position the cursor over the part of the image you want to magnify and click once. Use the Resolution drop-down menu to select the display resolution. Possible values are Auto (default), 640x480, 320x240, or 160x120. The display changes to the new resolution immediately after it is selected. Snapshot You use the Snapshot button to capture a still image of the video display.
Advanced Configuration with the Web-based Utility Chapter 3 Video Format •• Current Date/Time This displays the Camera’s current To select the video format, click the Video Format button, and the Video Format window appears. Select either MPEG-4 or MJPEG, then click Save. To exit without saving, click the X in the upper-right corner of the window. •• Time Zone Select the time zone for the Camera’s date and time. If it is incorrect, click Sync with PC to use your computer’s date and time. location.
Advanced Configuration with the Web-based Utility Chapter 3 and the fields that accompany them are described in detail below. •• Disable This option implements no security on your wireless network. Data is not encrypted before transmission. Wireless Security - Disable Security Mode •• Shared Key Enter the shared key of 8 to 63 characters that will be used to access the wireless network.
Advanced Configuration with the Web-based Utility Chapter 3 Max Frame Rate Select the maximum frame rate for the camera. Reducing this lowers the amount of bandwidth required by the camera. The range is from 1 to 30. NOTE: Video quality and/or performance may be affected by the number of users connected to the Camera. It may be helpful to know the bit rates for video viewing or recording at different resolutions and image quality levels. The following table lists these estimated bit rates.
Advanced Configuration with the Web-based Utility Chapter 3 Firmware Upgrade Editing the Database Upgrade Firmware New firmware versions are posted at www.linksysbycisco.com and can be downloaded for free. If the Camera is functioning satisfactorily, there is no need to download a newer firmware version, unless that version has a new feature that you want to use. Loading new firmware onto the Camera does not always enhance its performance.
Chapter 3 Advanced Configuration with the Web-based Utility Domain Name Enter the domain name assigned to you by your DDNS service provider. E-Mail Address Enter the E-mail address used to register the DDNS service. TZO Key Enter the TZO key provided by your DDNS service provider. Update Period Use this to set the schedule for checking whether the Internet IP address has been changed. Specify how often to check, from Every 15 mins to Every 24 hrs, as well as the time to start checking, in hh:mm format.
Advanced Configuration with the Web-based Utility Chapter 3 Audio Port To change the Audio Port, enter the new port number (even values only, from 1024 to 65534) in the field provided. The default Audio Port, 2242, can be used for multicasting and does not normally need to be reconfigured. If this port number needs to be changed, contact your network administrator.
Advanced Configuration with the Web-based Utility Chapter 3 Set Sensitivity Area Set Sensitivity Area If you want to specify the sensitivity area settings for motion detection, click this button to display the Set Sensitivity Area window. The Set Sensitivity Area window lets you specify the area of the video screen that is used to detect motion. This is either the full screen, or up to three user-defined custom areas within the full screen.
Advanced Configuration with the Web-based Utility Chapter 3 Browse Click Browse to select the Samba server where your video files will be saved. Browse to the location where you wish to save your video files and click Apply. Setup > Status The Setup > Status screen allows you to view the Camera’s status information and log. Browse Setup > Status Samba Server This displays the address of your Samba server. Upload Path This displays the upload path to your Samba server.
Advanced Configuration with the Web-based Utility Chapter 3 Log System Log This shows the Camera’s activities. To empty the log, click Clear Log. To get the Camera’s most up-to-date information, click Refresh. To get additional information about the screen’s features, click Help. Help Through the Help screen, you’ll find links to additional resources for the Camera and its Utility.
Appendix A Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-N Internet Home Monitoring Camera. Read the description below to solve your problems. If you can’t find an answer here, check the Linksys website at www.linksysbycisco.com.
Troubleshooting Appendix A Frequently Asked Questions Can I view video using a Macintosh or Netscape Navigator? The Camera is designed for computers running a Windows operating system and Internet Explorer 5.5 or higher. You cannot view video on a Macintosh. If you only have Netscape, you can view video using the Camera Utility. See “Chapter 3: Installing and Using the Camera Utility.” Can I directly connect the Camera to wired and wireless networks at the same time? No.
Appendix A Troubleshooting What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: •• CSMA/CA plus Acknowledge protocol •• OFDM protocol •• Multi-Channel Roaming •• Automatic Rate Selection •• RTS/CTS feature •• Fragmentation •• Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other.
Wireless Security Checklist Appendix B Appendix B: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Specifications Appendix C Appendix C: Specifications Environmental Specifications Dimensions 3.54” x 4.72” x 1.46” (90 x 120 x 37 mm) Weight 4.59 oz (130 g) Power 5V, 1A Model WVC80N Certification Standards IEEE 802.3u, 802.11g, 802.11b, draft 802.11n FCC, UL/cUL, ICES-003, RSS210 Operating Temp. 32 to 95°F (0 to 35°C) LEDs Power, Wi-Fi Protected Setup™ Storage Temp.
CGI Commands Appendix D Appendix D: Common Gateway Interface (CGI) Commands Overview CGI (Common Gateway Interface) is a simple method to send or receive data from a program or application through a web interface. The WVC80N supports a multitude of CGI commands that can be passed to it via HTTP from your client PC or mobile phone. This will allow you to perform basic functions such as view the camera’s video stream, capture a snapshot or retrieve the camera’s status information.
CGI Commands Appendix D Snapshot Method: GET URL: http:///img/snapshot.cgi?[size=][&quality=] Parameter Value and description size Image resolution 1: 160x120 2: 320x240 3: 640x480 quality Quality level 1: Very high 2: High 3: Normal 4: Low 5: Very low Snapshot (continued) Example 1: To snapshot a 640x480 very high quality JPEG image from network Camera 192.168.0.99, http://192.168.0.99/img/snapshot.
CGI Commands Appendix D If the client player is the QuickTime player, the latency is always approximately 3 second. If there is no audio content in the streaming, you can use the extension parameter “[?|&]latency=no” to push the QuickTime player to play the streaming video without any latency, but this method causes the frame rate to be unstable. Example: rtsp:///img/video.
CGI Commands Appendix D Here are the details of the parameter pairs: Parameter Value and description hostname Camera name, example: MyCamera description Camera description, example: Hello camera defname Camrea default name, example: default name mac Camera’s MAC address, example: 00C002123456 company_name Camera’s comany name, example: Cisco model_number Camera’s model number, example: WVC80N resolutions The resolutions camera support, valid values: [640*480,320*240,160*120] mpeg4_
CGI Commands Appendix D Admin-Level CGI Commands (Administrator level privilege) Query FW Version Method: GET URL: http:///adm/sysinfo.cgi Return: The Camera returns a Web page that contains the following messages: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n \r\n Firmware Version: v1.0.00 build 01 \r\n Serial Number: SQJ00G100001\r\n Reboot Method: GET URL: http:///adm/reboot.cgi Return: HTTP/1.
CGI Commands Appendix D Parameter Value and description 1. To get all group settings group_name (The group name is not case sensitive.) group 2. To get a specific setting from a group group_name.parameter_name 3. To get the settings from multiple groups group_name&group_name... Return: All group settings or one group setting is returned as follows: HTTP/1.0 200 OK\r\n … content-type: text/plain\r\n ... \r\n [group1]\r\n \r\n \r\n ...
CGI Commands Appendix D Get/Set System Date and Time Method: GET URL: http:///adm/date.
CGI Commands Appendix D Upload/Download Configuration Download Configuration Content Method: GET URL: http:///adm/admcfg.cfg Return: HTTP/1.0 200 OK \r\n … content-type: application/configuration\r\n \r\n All data in the configuration is encoded in a Base64 format. Please refer to the encoder/decoder sample codes at the end of this appendix. To validate the data, there is a hidden checksum inside the configuration content.
CGI Commands Appendix D Download Logs Method: GET URL: http:///adm/log.cgi Return: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n\r\n … Motion Detection Commands You can configure the motion detection sensitivity area to be either the entire screen or up to three specific areas. Each area can have its own name and threshold setting. Once the moving indicators exceed the user-configured threshold, a motion detection event will be triggered.
CGI Commands Appendix D Return: All group settings or one group setting is returned as below: HTTP/1.0 200 OK\r\n … content-type: text/plain \r\n ...
CGI Commands Appendix D Parameter Value and description md_name1 ... md_name4 Name of the motion detection area 1 ~ 4 (12 ASCII characters) md_window1 ... md_window4 The coordinates of motion detection window N (relative to resolution 640x480) X1, Y1, X2, Y2 md_threshold1 ... md_threshold4 The threshold of motion detection window N (0 - 255) Return: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n \r\n OK\r\n Notes: The first motion window is used for full screen.
CGI Commands Appendix D SMB/CIFS Server/SharedFolder Commands SMB/CIFS Server Survey Method: GET URL: http:///adm/smb_survey.cgi[?parameter=value[¶meter=value...]] Parameter Value and description timeout (Optional) The timeout in seconds of the CGI The CGI will stop surveying and return the result if it times out. Valid values: 5-120 (default is 30) action (Optional) This CGI will terminate survey action.
CGI Commands Appendix D SMB/CIFS SharedFolder Command Method: GET URL: http:///adm/smb_dirctrl.cgi?server=value[¶meter=value...
CGI Commands Appendix D Base-64 Encoder/Decoder Sample Codes // Standard BASE64 table // char keyStr[] = “ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=”; // SerComm BASE64 table char keyStr[] = “ACEGIKMOQSUWYBDFHJLNPRTVXZacegikmoqsuwybdfhjlnprtvxz0246813579=+/”; //-------------------------------------------------------------------// Description: Encrypt the input data with the base64 // Input: // char i_buf[] - input buffer // Output: // char o_buf[] - output buffer // Return: // encry
CGI Commands Appendix D else if(chr3 == (char)0) { enc4 = 64; } o_buf[j++] = keyStr[enc1]; o_buf[j++] = keyStr[enc2]; o_buf[j++] = keyStr[enc3]; o_buf[j++] = keyStr[enc4]; // OK, now clean out the variables used. chr1 = chr2 = chr3 = (char)0; enc1 = enc2 = enc3 = enc4 = (char)0; } while (i < strlen(i_buf )); //And finish off the loop //Now return the encoded values.
CGI Commands Appendix D //Heres the decode part. There’s really only one way to do it.
Appendix E Appendix E: Warranty Information Limited Warranty FOR CONSUMERS WHO ARE COVERED BY CONSUMER PROTECTION LAWS OR REGULATIONS IN THEIR COUNTRY OF PURCHASE OR, IF DIFFERENT, THEIR COUNTRY OF RESIDENCE, THE BENEFITS CONFERRED BY THIS WARRANTY ARE IN ADDITION TO ALL RIGHTS AND REMEDIES CONVEYED BY SUCH CONSUMER PROTECTION LAWS AND REGULATIONS. THIS WARRANTY DOES NOT EXCLUDE, LIMIT OR SUSPEND ANY RIGHTS OF CONSUMERS ARISING OUT OF NONCONFORMITY WITH A SALES CONTRACT.
Appendix E Warranty Information OF SUCH DAMAGES. TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this limited warranty fails of its essential purpose.
Regulatory Information Appendix F Appendix F: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix F Regulatory Information Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian ICES-003 and RSS210. The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Appendix F User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix F Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix F Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix F Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix G Appendix G: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix G License Restrictions.
Appendix G Software can enable any other computer (on the same primary network) to generate reports. When a computer is enabled, that computer shows a notification that it is being monitored. As long as that computer is enabled, each time the Software is started the user of that particular computer will see a notification that it is being monitored by the reports feature. Any computer on the network with the Software installed can enable or disable any other computer from the reports feature.
Appendix G Software End User License Agreement Disclaimer of Liabilities.
Appendix G send you Service related email messages as long as you are a subscriber to the Service. If you wish to opt-out of receiving Service related email messages, you may cancel the Service by providing written notice via www. networkmagic.com/support to Cisco of such cancellation and uninstalling the Software and discontinuing your use of the Service.
Appendix G 1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Appendix G 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
Appendix G 12.
Appendix G Public License permits more lax criteria for linking other code with the library. We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
Appendix G Software End User License Agreement (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.
Appendix G a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Appendix G 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix G Schedule 3-C OPENSSL LICENSE If this Cisco product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Appendix G Software End User License Agreement 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.