Page 106 / 139 Scroll up to view Page 101 - 105
10µ
D-Link DCS-±1±0 User Manual
Section ² - Configuration
1 Check “Enable motion detection.”
2 Click on “New” to have a new window to monitor
video.
3 Enter in a window name.
4
Adjust the “Sensitivity” and “Percentage” levels according to the local environment. The highest sensitivity and
lowest percentage provides the most sensitive setting.
5
After adding the motion window, click on save to enable the activity display. You can add up to 3 motion windows
to trigger recording.
To schedule video recording with motion detection, you must first enable motion detection on the Network camera. Click
the Motion Detection button under the Advanced tab from the Configuration screen to access settings that affect how
the DCS-2120 Network camera can serve as a security
device by recording only when motion is detected.
Note:
These settings can be configured in your Web
browser and while logged into the IP surveillance
Program.
In this window, follow the steps below to ensure that
motion detection is correctly enabled:
Schedule Video Recording with Motion Detection
Page 107 / 139
10¶
D-Link DCS-±1±0 User Manual
Section ² - Configuration
For detailed information about each setting, please refer to
Configuration > Advanced > Motion Detection
in the
section titled “Using the DCS-2120 With an Internet Browser” (page 29).
Next, run the IP surveillance program. Click on the Configurations button and select Scheduler.
In the Primary Schedule you can choose either Once (for one time recording) or Every Day (for scheduled recording).
For example, if you would like to record events every day during a certain time frame, click on the beginning time
and drag your mouse to the ending time. Schedule recording can be configured by minutes, hours, days, weeks, or
months.
The Secondary Schedule allows you to set a schedule
outside the Primary Schedule. The Secondary Schedule
provides two options to record without a specified date or
time. You can select Event Mode, which will record whenever
an event is triggered, or Continuous Mode, which will begin
continuously after scheduling settings are saved. You do
not need to set the Secondary Schedule with the Primary
Schedule. To schedule video recording with motion detection,
you can use either the Primary Schedule or Secondary
Schedule, or both.
Page 108 / 139
10·
D-Link DCS-±1±0 User Manual
Section ² - Configuration
Click the Save button when finished. You have now set a schedule to record video when motion detection is triggered.
If you would like to save this configuration, click Save As to save this configuration to a folder in your hard drive. This
configuration can be used on another system running IP surveillance or can be used as a backup if you need to
re-install the IP surveillance software program.
1
Check if you want the recording schedule to occur Once or Every day.
2
Set the date, time-line, and begin and end times for recording.
3 Check Event Mode.
4
Select the motion detection window that will be used to trigger motion detection.
Note:
You must first create motion detection windows in the Web configuration page of the camera.
Remember the names of the windows and the order in which you created them, as they are not displayed
inside the scheduler. Instead, they are listed in the order they were added. For example, the first window
created is labeled “Window1.”
5
Click on “Disable” under the Secondary Schedule.
In this window, follow the steps below to schedule video recording with motion detection in the Primary Schedule:
Page 109 / 139
10¸
D-Link DCS-±1±0 User Manual
Section ³ - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DCS-
2120 offers the following types of security:
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When
using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit
encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal
- using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can change keys easily.
Page 110 / 139
110
D-Link DCS-±1±0 User Manual
Section ³ - Security
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been
tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top