Note: Emphasizes important information or calls your attention to related features or instructions. Caution: Alerts you to a potential hazard that could cause loss of data, or damage the system or equipment. Revision History This section summarizes the changes in each revision of this guide. This is the second version of this guide. This guide is valid for software release v1. It includes the following changes:. This is the first version of this guide. This section provides an overview of the switch, and introduces some basic concepts about network switches.
It also describes the basic settings required to access the management interface. This switch provides a broad range of features for Layer 2 switching and Layer 3 routing. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch.
The switch provides a wide range of advanced performance enhancing features. Flow control eliminates the loss of packets due to bottlenecks caused by port saturation. Storm suppression prevents broadcast, multicast, and unknown unicast traffic storms from engulfing the network. CoS priority queueing ensures the minimum delay for moving real-time multimedia data across the network.
While multicast filtering and routing provides support for real-time network applications. Authentication This switch authenticates management access via the console port, Telnet, or a web browser.
User names and passwords can be configured locally or can be verified via a remote authentication server i. Port-based authentication is also supported via the IEEE MAC address filtering and IP source guard also provide authenticated port access. While DHCP snooping is provided to prevent malicious attacks from insecure ports.
ACLs can be used to improve performance by blocking unnecessary network traffic or to implement security controls by restricting access to specific network resources or protocols. Port Configuration You can manually configure the speed, duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the connection settings used by the attached device. Use full-duplex mode on ports whenever possible to double the throughput of switch connections.
Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded. The switch supports flow control based on the IEEE Rate Limiting This feature controls the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network.
Packets that exceed the acceptable amount of traffic are dropped. Port Mirroring The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach a protocol analyzer or RMON probe to this port to perform traffic analysis and verify connection integrity.
Port Trunking Ports can be combined into an aggregate connection. The additional ports dramatically increase the throughput across any connection, and provide redundancy by taking over the load if a port in the trunk should fail.
The switch supports up to 16 trunks per switch and 32 per stack. Storm Control Broadcast, multicast and unknown unicast storm suppression prevents traffic from overwhelming the network.
When enabled on a port, the level of traffic passing through the port is restricted. If traffic rises above a pre-defined threshold, it will be throttled until the level falls back beneath the threshold. Static addresses are bound to the assigned interface and will not be moved. When a static address is seen on another interface, the address will be ignored and will not be written to the address table.
Static addresses can be used to provide network security by restricting access for a known host to a specific port. IEEE The address table facilitates data switching by learning addresses, and then filtering or forwarding traffic based on this information.
The address table supports up to 16K addresses. Store-and-Forward The switch copies each frame into its memory before forwarding them to another Switching port.
This ensures that all frames are a standard Ethernet size and have been. This prevents bad frames from entering the network and wasting bandwidth. To avoid dropping frames on congested ports, the switch provides 12 Mbits for frame buffering.
This buffer can queue packets awaiting transmission on congested networks. Spanning Tree The switch supports these spanning tree protocols:.
When there are multiple physical paths between segments, this protocol will choose a single path and disable all others to ensure that only one route exists between any two stations on the network.
This prevents the creation of network loops. However, if the chosen path should fail for any reason, an alternate path will be activated to maintain the connection. It is intended as a complete replacement for STP, but can still interoperate with switches running the older standard by automatically reconfiguring ports to STP-compliant mode if they detect STP protocol messages from attached devices. It can provide an independent spanning tree for different VLANs.
It simplifies network management, provides for even faster convergence than RSTP by limiting the size of each region, and prevents VLAN members from being segmented from the rest of the group as sometimes occurs with IEEE Connectivity Fault The switch provides connectivity fault monitoring for end-to-end connections Management within a designated service area by using continuity check messages which can. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network.
Members of VLAN groups can be dynamically learned via. This allows the switch to restrict traffic to the VLAN groups to which a user has been assigned. By segmenting your network into VLANs, you can:. Eliminate broadcast storms which severely degrade performance in a flat network. Description This field is used for entering a description, such as the location of the Network Camera. Choose the Time Zone for your location from the drop-down list.
If your location is currently using Daylight Saving, enable the Adjust for daylight saving checkbox. Select the desired options. LED Operation Enable this if you want to use this function. Normally, your ISP will provide this address. Secondary DNS server - This is optional. If enabled, you can connect using either port 80 or the Secondary port.
You must enter the Secondary port number between to in the field provided. Note that when using a port number which is not 80, you must specify the port number in the URL. For example, if the Camera's IP address was Enter the desired value between and Video Address Enter the address of video.
Video Port Enter the desired value between to in the field provided. The number you entered must be even values. Audio Address Enter the address of the audio. Audio Port Enter the desired value between to in the field provided. Time to Live Enter the desired length of time, if the packets fail to be delivered to their destination within. The Time to Live you entered must be in-between 1 to The SSID is case sensitive.
Domain Select your region from the drop-down list. Channel No. Other Wireless stations should use the same setting. Anyone using the correct SSID can connect to your network. Data is encrypted before transmission, but the encryption system is not very strong. Note: In Infrastructure mode, either setting will normally work, since most Access Points can use both methods. If encryption strength is set to bit, then each of the four key fields will be populated with key values.
If encryption strength is set to bit, then only the selected WEP key field will be given a key value. Other stations must have the same key values. Data is encrypted using a key derived from the network key. Other Wireless Stations must use the same network key. The PSK must be from 8 to 63 characters in length. This system allows other internet users to connect to you using the Domain Name allocated by the DDNS service provider.
This screen is displayed when the DDNS menu option is clicked. Service Provider Choose a service provider from the list. The update is performed by the camera. The default values for bandwidth is Unlimited, which allows you to specify the desired frame rate.
Options Microphone Enable audio by checking this checkbox. The camera administrator must use the "User Database" menu option to create the desired users. If this option is selected, you need to define a schedule. If no schedule is defined, this option is always disabled. Access Schedule Scheduled Periods This displays all periods you have entered into the database. If you have not entered any periods, this list will be empty.
Delete Use the Delete button to delete the selected item in the list. Add Period Day Choose the desired option for the period. End Time Enter the end time using a 24 hr clock. Add Click this button to add a new period. If you have not entered any users, this list will be empty. Edit, Delete, Delete All Use these buttons to manage the user database. User Properties User Name Enter the name for the user here. User Password The password for this user. Confirm Password Re-enter the password for the user, to ensure it is correct.
Add Button Click this button to add a new user, using the data shown on screen. Clear Button Use this button to clear the input fields, ready to add a new user.
Note: Motion detection can be triggered by rapid changes in lighting condition, as well as by moving objects. For this reason, it should only be used indoors. Threshold Adjust the threshold of detection for each area. The E-Mail alert will be sent to the EMail address or addresses specified here. Subject Enter the desired text to be shown as the "Subject" for the EMail when it is received.
Subject can not exceed 48 alphanumeric characters. Port Number Enter the port number for the proxy server. Method Select the desired method of form data encoding. Generally it is advisable to do so. Start Time Choose the desired start time using a 24 hr clock. End Time Choose the desired end time using a 24 hr clock. Trigger Event Motion Detection If enabled, movement in a motion detection window can be used to trigger events.
Interval Select the desired option for the events interval. Jabber server must be configured on the Instant Messaging page. The snapshot s of the JPEG image depends on this setting, and also the file size and degree of compression. The size of the file depends on this setting, and also the Video size and degree of compression.
Administrator Password The password for the Administrator. Verify Password Re-enter the password for the Administrator, to ensure it is correct. Spaces, punctuation, and special characters must NOT be used in the name.
Select this file. Start Click this button to start the Firmware. When the upgrade is finished, the Network Camera will restart, and this management connection will be unavailable during the restart. It only clears the input for the "Upgrade File" field. Restore Configuration File Click Restore button to reinitialize the camera to load the new updated software.
Do this after loading the upgrade file. It only clears the input for the "Restore Configuration File" field. Restore Factory Defaults Click Defaults button to reloads all default settings on the camera. Restart Camera Click Restart button to restarts the camera.
Description This shows the description of the Network Camera, such as location. Network Mask The network mask associated with the IP address above. Channel This shows the wireless channel currently used.
Security The current security setting for Wireless connections. Signal Strength This shows the strength of the signal. Video Quality This displays the image quality of the video stream.
Frame Rate This displays the frame rate of the video stream. Buttons Refresh Update the log and any other data on screen. Refresh Button Click this to update the data shown on screen. Clear Log Click this button to restart the log. Overview This chapter covers some common problems that may be encountered while using the Network Camera and some possible solutions to them.
If you follow the suggested steps and the Network Camera still does not function properly, contact your dealer for further advice. If you don't have a router, this must be the case. In Windows, this is done by using Control Panel-Network. All devices on your LAN must use compatible values.
Ask the Administrator for your User Name and Password. Problem 4 I can't connect to the Network Camera using a Wireless connection. Only one interface can be active. Problem 5 Video quality may suddenly deteriorate. Solution 5 This can happen when an additional viewer connects to the Network Camera, overloading the camera or the available bandwidth.
The image size and quality can be adjusted to cater for the required number of viewers and the available bandwidth. Problem 6 The motion detection feature doesn't send me any E-Mails.
This is to prevent span being sent from the server. Problem 7 Using the motion detection feature, I receive E-Mails which don't show any moving objects. Solution 7 The motion detection feature doesn't actually detect motion.
It compares frames to see if they are different. Major differences between frames are assumed to be caused by moving objects. This feature can NOT be used if the camera is outdoors. Problem 8 The image is blurry. Video created will the lower settings will contain less detail; this is the trade-off for using less bandwidth.
In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures. Some are covered by other Licenses as listed in the table below. Details of each applicable license are contained in the following section.
Mills Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. This code is derived from software contributed to Berkeley by Paul Vixie.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.
Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it.
You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish , that you receive source code or can get itif you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights.
These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.
If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.
To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.
EpiCamera Answered. Which IP Cameras do you support? Do my clients have to buy IP camera from you? Thus your clients do not need to purchase a "motion detection webcam". Also, webcams that rotate to track people will result in false motion detection and are not advisable for use with EpiCamera. For better results, we recommend to get a IP camera instead of using webcam. Of course yes! Any doubt you can always email to us at support epicamera. But if they are using web camera, unfortunately the current software to convert web camera to IP camera is only for Window XP, Vista and 7.
We are still in the midst of working on the software for webcam used on a MAC.
0コメント