Page 116 / 153 Scroll up to view Page 111 - 115
11´
D-Link DCS-5±±0 User Manual
Section ³ - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DCS-
5220 offers the following types of security:
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When
using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit
encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal
- using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can change keys easily.
Page 117 / 153
11µ
D-Link DCS-5±±0 User Manual
Section ³ - Security
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been
tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
Page 118 / 153
11¶
D-Link DCS-5±±0 User Manual
Section ³ - Security
To ensure the highest security and prevent unauthorized
use of the Internet Camera, the Administrator has the
exclusive privilege to access the System Administration
settings to allow users entry and authorize privileges
for all users. The Internet Camera supports multi-level
password protection/access to the Internet Camera
that can be restricted to defined users who have a User
Name and User Password, which is assigned by the
Administrator.
The Administrator can release a public user name and password so that when remote users access the Internet Camera
they will have the right to view the image transmitted by the Internet Camera.
When the Internet Camera is used for the first time, it is highly recommended that the Administrator set the Administrator’s
Password to constrain user access to the Internet Camera since the Default settings are Null String (no password).
Once the Password is defined, only the Administrator has access to the management of the
Internet Camera. This
procedure should be done as soon as possible since the security features of the Internet Camera will not be enabled
until the Administrator Password is defined.
At this point it is highly recommended that you click on
the Configuration button on the Home screen, and then
the Tools tab to bring you to the Admin screen. Enter a
password for security purposes.
Setting Security
Page 119 / 153
11·
D-Link DCS-5±±0 User Manual
Section ³ - Security
D-Link’s DCS-5220 is a versatile and cost effective Internet Camera offering both video and audio monitoring. It can
also serve as a powerful surveillance system in security applications. The DCS-5220 can be used with any wired or
802.11b/g wireless router. This section explains how to view the camera from either the Internet or from inside your
internal network.
Materials Needed:
• 1 DCS-5220 Internet Camera
• 1 Ethernet Cable
• A Wired or Wireless router such as the D-Link DI-624 Wireless Router
Ethernet based PC for system configuration
Setting up the DCS-5220 for Use Behind a Router
Installing a DCS-5220 Internet Camera on your network is an easy 4–step procedure:
1 Assign a Local IP Address to Your Internet Camera
2 View the Internet Camera Using Your Internet Explorer Web Browser
3 Access the Router with Your Web Browser
4 Open Virtual Server Ports to Enable Remote Image Viewing
This section is designed to walk you through the setup process for installing your camera behind a router and enable
remote video viewing. For the basic setup of the DCS-5220, follow the steps outlined in the Quick Installation Guide.
Using & Configuring the DCS-5220 with a NAT Router
Page 120 / 153
1±0
D-Link DCS-5±±0 User Manual
Section ³ - Security
Run the Installation Wizard program from the CD included with the DCS-5220. Follow the steps in the Quick Installation
Guide to configure the DCS-5220. The camera will be assigned a local IP Address that allows it to be recognized by
the router. Write down this IP Address for future reference.
1
Assign a Local IP Address to Your Camera
After you have completed the setup of the DCS-5220 outlined in the Quick Installation Guide you will have an operating
camera that has an assigned IP Address. Because you are using a router to share the Internet with one or more PCs,
the IP Address assigned to the Internet Camera will be a local IP Address. This allows viewing within your Local Area
Network (LAN) until the router is configured to allow remote viewing of the camera over the Internet.
This is the IP Address assigned to your camera. Write it down for later use. 192.168.0.120 is only an example. You
will probably have a different IP Address.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top