Linksys WVC54GCA User Manual

Wireless-g internet home monitoring camera
Hide thumbs Also See for WVC54GCA:

Advertisement

Quick Links

USER GUIDE
Wireless-G Internet
Home Monitoring Camera
WVC54GCA
Model:
Downloaded from
www.Manualslib.com
manuals search engine

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WVC54GCA

  • Page 1 USER GUIDE Wireless-G Internet Home Monitoring Camera WVC54GCA Model: Downloaded from www.Manualslib.com manuals search engine...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Back Panel .
  • Page 4 Table of Contents Avis de non-responsabilité concernant les appareils sans fil ....35 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) .
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Bottom Panel Chapter 1: Product Overview Thank you for choosing the Linksys Wireless-G Internet Home Monitoring Camera. The Camera sends live video through the Internet to a web browser anywhere in the world! This compact, self-contained unit lets you keep an Reset Button eye on your home, your kids, your workplace—whatever’s Opening...
  • Page 6: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 7: Chapter 3: Setting Up And Mounting The Camera

    Setting Up and Mounting the Camera Chapter 3 Chapter 3: Setting Up and Mounting the Camera Setup Wizard The Wireless-G Internet Home Monitoring Camera Setup Wizard will guide you through the installation and configuration procedure. Insert the Setup CD-ROM into your CD-ROM drive. The Setup Wizard should run automatically, and the End User License Agreement Welcome screen should appear.
  • Page 8 Setting Up and Mounting the Camera Chapter 3 Plug the included power adapter into the Camera’s If the Camera you want is not displayed, click Search Power port. Plug the other end into an electrical outlet. Again to run a new search for Cameras. Click Next.
  • Page 9 Setting Up and Mounting the Camera Chapter 3 The Wizard displays the wireless security method that your network is using: WPA/WPA2-Personal, WEP (128-Bit), or WEP (64-Bit). Follow the appropriate instructions below. If you are not using wireless security, select Disabled and go to step 14. •...
  • Page 10 Setting Up and Mounting the Camera Chapter 3 Review the Camera’s settings. To make changes to the Reconnect the power to the Camera. Click Next. settings, click Back to go back to the previous screen. If the settings are correct, click Save to continue. Reconnect the Power The Setup Wizard displays Camera successfully...
  • Page 11: Placement Options

    Setting Up and Mounting the Camera Chapter 3 Placement Options Adjust the tilt of its head accordingly, as described below in section “Camera Head Tilting”. The Camera can stand on a surface or be mounted on a wall. Depending on the positioning you want, you attach the Camera head to its stand at two different points.
  • Page 12 Setting Up and Mounting the Camera Chapter 3 Camera Head Tilting After the Camera is assembled, you can tilt the Camera head on its ball joint using the lock nut on the camera stand. Loosen the lock nut, tilt the camera head as desired, then tighten the lock nut to secure the position.
  • Page 13: Chapter 4: Installing And Using The Camera Utility

    Installing and Using the Camera Utility Chapter 4 Using the Camera Utility for the First Time Chapter 4: Installing and Using the The Camera Utility starts up automatically after the Utility is successfully installed. This section describes the steps to Camera Utility follow to set up the Camera.
  • Page 14: Using The Camera Utility

    Installing and Using the Camera Utility Chapter 4 Using the Camera Utility After the Camera Utility is installed, its icon is displayed on the Desktop and in the System Tray of the Taskbar. To open the Camera Utility, use either icon as follows: •...
  • Page 15 Installing and Using the Camera Utility Chapter 4 Viewing Area Multiple-Camera Layouts The Viewing Area takes up most of the Monitor window. In a multiple-Camera layout, one of the video windows is always outlined in green. This indicates the currently The Viewing Area can have four different layouts, with selected Camera.
  • Page 16 Installing and Using the Camera Utility Chapter 4 Video Control Buttons Video Selection This section of the Playback window lets you select the The video control buttons are located along the lower left edge of the viewing area. These buttons act upon the video(s) for playback.
  • Page 17 Installing and Using the Camera Utility Chapter 4 Basic Video Controls Hard Disk Quota This section of the Playback window lets you perform basic This section of the Playback window indicates how much functions on the video(s) you have selected for playback. hard disk is allocated for recorded video.
  • Page 18 Installing and Using the Camera Utility Chapter 4 Setup Screen Port Number Displays the Camera’s port number. User Name and Password Displays the user name. The The Setup screen is accessed by clicking the Setup button password is displayed as “•••••“ for security reasons. on the Monitor window of the Camera Utility.
  • Page 19 Installing and Using the Camera Utility Chapter 4 Setup > Recording Schedule Memory Requirements for Video Recordings You may find it helpful to know how much memory is To set up a recording schedule for a Camera, then click the required to hold a video recording.
  • Page 20 Installing and Using the Camera Utility Chapter 4 Instant Recording Time Limit Maximum Time Limit for Instant Recording This is the maximum length of a recording that is started by clicking the Record button on the Monitor window. The default is 10 min.
  • Page 21: Chapter 5: Advanced Configuration With The Web-Based Utility

    Advanced Configuration with the Web-based Utility Chapter 5 Chapter 5: Linksys Web – Select this tab to go to the Linksys • website, www.linksys.com. Advanced Configuration – Select this tab to display the Help screen. Go to • Help the “Help” section for more information. with the Web-based Utility Exit •...
  • Page 22 Advanced Configuration with the Web-based Utility Chapter 5 Resolution Snapshot Use the Resolution drop-down menu to select the display You use the Snapshot button to capture a still image of resolution. Possible values are Auto (default), 640x480, the video display. 320x240, or 160x120.
  • Page 23: Setup > Basic

    Advanced Configuration with the Web-based Utility Chapter 5 Setup > Basic Network Settings Configuration Type • If you want to automatically The Setup > Basic screen appears when you click the Setup assign the Camera an IP address from a DHCP server, tab or Advanced Configuration on the Welcome screen.
  • Page 24: Setup > Image

    Advanced Configuration with the Web-based Utility Chapter 5 Setup > Image The Setup > Image screen allows you to alter the Camera’s video settings. Wireless Security - WEP Security Mode TX Key Select the number of the key used on the •...
  • Page 25: Setup > Administration

    Advanced Configuration with the Web-based Utility Chapter 5 Setup > Administration Estimated Bit Rates for Video Viewing or Recording Resolution Quality Level Bit Rate in kbps The Setup > Administration screen allows you to change 640 x 480 Very High 4000 the Camera’s login name and password, reset the factory defaults, upgrade the firmware, and set the language.
  • Page 26: Setup > Users

    Advanced Configuration with the Web-based Utility Chapter 5 To upgrade the firmware: Other operations: Go to www.linksys.com, and download the firmware Clear While editing a user’s information, click Clear to • clear the User Name, Password, and Confirm Password upgrade file for the Camera. Then extract the file. fields and start over.
  • Page 27 Advanced Configuration with the Web-based Utility Chapter 5 RTSP Port To change the RTSP Port number, enter the NOTE: Before you can use the Camera’s DDNS desired number in the range of 1024 to 65535. The feature, you must configure the port forwarding default is 554.
  • Page 28: Setup > Motion Detection

    Advanced Configuration with the Web-based Utility Chapter 5 Setup > Motion Detection Send To Enter the e-mail address where e-mail will be sent upon motion detection. You can optionally specify The Setup > Motion Detection screen allows you to up to three addresses. configure the Camera’s motion detection settings.
  • Page 29: Setup > Status

    Advanced Configuration with the Web-based Utility Chapter 5 Setup > Status The following fields appear on the left side of the Set Sensitivity Area window for each sensitivity area. Specify The Setup > Status screen allows you to view the Camera’s the settings as needed, then click Apply.
  • Page 30: Help

    Advanced Configuration with the Web-based Utility Chapter 5 Help Through the Help screen, you’ll find links to additional resources for the Camera and its Utility. If you select the Help tab directly from the Welcome screen, then you will see the User Help screen and will only be able to access these resources.
  • Page 31: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: I’m not able to play my recording video files. Make sure you have Microsoft Windows Media Player Troubleshooting 7 or higher. If you don’t, you can download the latest version from www.microsoft.com. I can’t view the Camera’s video using Internet Explorer. I have two Cameras and see two WVC54GCAs listed in my Camera Utility.
  • Page 32: Appendix B: Specifications

    Appendix B: Minimum System Requirements 1 Camera PC with 2 GHz or faster Specifications processor 512 MB RAM Model WVC54GCA Microsoft Windows 2000, XP or Vista Standards IEEE 802.11g, IEEE 802.3, IEEE 802.3u 500MB of available hard Ports Ethernet, Power...
  • Page 33: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 34 Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 35: Appendix D: Regulatory Information

    Regulatory Information Appendix D Safety Notices Appendix D: Regulatory Information • Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
  • Page 36: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 37: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
  • Page 38 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 39 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 40 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 41: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 42 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 43 Software License Agreement Appendix E TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 44 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 45 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 46 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 47 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 48 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 49 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 50 Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 51 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 52 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents