Vivotek IP7133 (WIRED) manual

Page 32

VIVOTEK - A Leading Provider of Multimedia Communication Solutions

3.WPA-PSK: Use WPA (Wi-Fi Protected Access) pre-shared key.

More secure than WEP, the Wi-Fi Alliance developed WPA (Wi-Fi Protected Access) in 2003 to address WEP’s weaknesses. Improvements included TKIP, which changes the encryption key for each data transmission.

Algorithm: Choosing one of the following algorithm for WPA-PSK and WPA2-PSK modes.

TKIP (Temporal Key Integrity Protocol): A security protocol used in the IEEE 802.11 wireless networks. TKIP is a “wrapper” that goes around the existing WEP encryption. TKIP comprises the same encryption engine and RC4 algorithm defined for WEP. However, the key used for encryption in TKIP is 128 bits long. This solves the first problem of WEP: a too-short key length. (From Wikipedia)

AES (Advanced Encryption Standard): In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. As of 2006, AES is one of the most popular algorithms used in symmetric key cryptography. (From Wikipedia)

Pre-shared Key: Entering a key in ASCII format. The length of the key is 8 ~ 63.

4.WPA2-PSK: Use WPA2 pre-shared key.

The advanced protocol, certified through Wi-Fi Alliance’s WPA2 program, implements the mandatory elements of 802.11i. In particular, it introduces a new AES-based algorithm, CCMP, that is considered fully secure. From March 13, 2006, WPA2 certification is mandatory for all new devices wishing to be certified by the Wi-Fi Alliance as “Wi-Fi CERTIFIED.” (From Wikipedia)

NOTE

After wireless configurations are completed, click Save and the camera will reboot. Wait for the live image is reloaded to your browser. For VIVOTEK 7000-series cameras, you have to unplug the power

cable and Ethernet cable from the camera; then re-plug the power cable to the camera. The camera will switch to wireless mode.

Some invalid settings may cause the system failing to respond. Change the Configuration only if necessary and consult with your network supervisor or experienced users for correct settings. Once the system has lost contact, refer to Appendix A for reset and restore procedures.

32 - User's Manual

Image 32
Contents IP Surveillance Table of Contents Package contents Read before useConnectors Physical descriptionDI/DO Diagram Hardware Reset Installation Network deploymentInternet connection with static IP Software installation Accessing the Network Camera Using web browsersPage Using Rtsp players Using 3GPP-compatible mobile devices MPEG-4Using Vivotek recording software Main Live Video Window Video title Title and time Client Settings MP4 Saving Options System Time SystemSystem DI and do Root Password SecurityAdd User Manage UserNetwork Network TypePPPoE Point-to-point over Ethernet Page Http FTP Rtsp Streaming Page Wireless LAN IP7134 only Page Page Ddns Dynamic domain name service DdnsCustomSafe100 Delete allowed list / Delete denied list Access listAllowed list / Denied list Video settings Audio and videoImage Settings Privacy mask Page Audio settings To enable motion detection, follow the steps below Motion detectionPercentage = 30% Media Settings ApplicationSnapshot20080104100341 Server Settings Page Page Event Settings Delete Current Log System logRemote Log View parameters Restore MaintenanceReboot Upload / Export Daylight Saving Time Configuration File Upgrade Firmware IP7133 URL Commands of the Network Camera AppendixGeneral CGI URL Syntax and Parameters Security LevelGet Server Parameter Values Security Level SUB-DIRECTORY DescriptionParameter pair Set Server Parameter Values Parameter Value DescriptionAvailable parameters on the server Valid Values DescriptionName Value Security Description GMT 0630 Rangoon GMT 0700 Bangkok, Hanoi, Jakarta MODEL-BRAND-VERSION Group security Name Value Security DescriptionSubgroup of network rtsp OPEN, Shared HEX, AsciiAES, Tkip Group ipfilterVGA Cmos = 4CIF QcifCIF Cmos JpegGroup imagepreview TZO DHSLoginfo LogemergLogalert LogcritPage Mjpeg Parameter Value Security Description One bit represents one digital input. The LSB Actiondoi0~ndo-1 Enable or disable trigger digital output Drive the Digital Output Query Status of the Digital Input Query Status of the Digital Output Do0=state\r\n Do1=state\r\n Do2=state\r\n Do3=state\r\nAccount Management Parameter Value Default DescriptionCapture Single Snapshot System Logs Upgrade Firmware System InformationIP Filtering Value DescriptionGet SDP of Streams Open the Network StreamTechnical Specifications .AGC, AWB, AESTechnology License Notice Electromagnetic Compatibility EMC Liability