Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring UPnP™ Settings
- 6.3.9 Configuring Wireless Dial Settings
- 6.3.10 Email Sending Triggered by Alarm
- 6.3.11 Configuring NAT (Network Address Translation) Settings
- 6.3.12 Configuring FTP Settings
- 6.3.13 Platform Access
- 6.3.14 HTTPS Settings
 
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Configuring Other Alarm
- 6.6.7 Configuring Audio Exception Detection
- 6.6.8 Configuring Defocus Detection
- 6.6.9 Configuring Scene Change Detection
- 6.6.10 Configuring Face Detection
- 6.6.11 Configuring Line Crossing Detection
- 6.6.12 Configuring Intrusion Detection
- 6.6.13 Configuring Region Entrance Detection
- 6.6.14 Configuring Region Exiting Detection
- 6.6.15 Configuring Unattended Baggage Detection
- 6.6.16 Configuring Object Removal Detection
 
- 6.7 VCA Configuration
 
- Chapter 7 Storage Settings
- Chapter 8 Counting
- Chapter 9 Road Traffic
- Chapter 10 Playback
- Chapter 11 Log Searching
- Chapter 12 Others
- Appendix
User Manual of Network Camera 
29 
the method used by your access point. Not all access points have this option, in 
which case they probably use Open System, which is sometimes known as SSID 
Authentication.   
  Key length - This sets the length of the key used for the wireless encryption, 64 or 
128  bit.  The  encryption  key  length  can  sometimes  be  shown  as  40/64  and 
104/128. 
  Key type - The key types available depend on the access point being used. The 
following options are available: 
 HEX - Allows you to manually enter the hex key. 
 ASCII - In this method the string must be exactly 5 characters for 64-bit WEP 
and 13 characters for 128-bit WEP. 
WPA-personal and WPA2-personal Mode:   
Enter the required Pre-shared Key for the access point, which can be a hexadecimal 
number or a passphrase. 
Figure 4-8 Security Mode- WPA-personal 
WPA- enterprise and WPA2-enterprise Mode:   
Choose  the  type  of  client/server  authentication  being  used  by  the  access  point; 
EAP-TLS or EAP-PEAP. 
EAP-TLS 










