Preview

Ip Camera Fixing

Satisfactory Essays
Open Document
Open Document
497 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ip Camera Fixing
How to visit the IP camera through Internet

1.Wireless Router setting
1)set the Router IP address is “192.168.1.1”

2)Enable wifi, wireless mode select “ G-only”, SSID is “ip camera”, wireless channel is “6-2.437GHz”.

3)set WIFI security, security mode is “WPA Personal”, wpa Algorithms is “AES”, Wpa Share key is “ 123456abcd”, Group key renewal is “3600”.

2. computer network setting
1)The defatult ip of the ip camera is 192.168.55.160,if your computer’s ip is not the sample like 192.168.18.55.*, you can add an ip like 192.168.55.22 to your computer, then you can visit the camera by your computer. 2)please click right button on the “My Network Places” button, select “properties”

3)click right button on the “Local Area Connection” button and select “properties”

4)select “Internet Protocl (TCP/IP)” and click “properties” button or double click “ Internet Protocol(TCP/IP)”.

5)click “Advancd” button ,

6)Click “Add” button to add a new ip like “192.168.55.22” to the computer.

7)Add a new ip like “192.168.55.22” to the computer

8) click “OK” button to exit the ip address setting . then you can try to run “ ping 192.168.55.160” to check whether the computer and the ip camera connection is ok after you connected the camera and computer to the same Lan .

3.login the camera and forward port in the router
1)login the camera through 192.168.55.160

2)like the ip camera ip address setting , DNS is same with the router 3)enable the wifi setting , the ip address is same subnet with the router , the gateway is the router’s local ip address.

4) the SSID is same with the router (ip camera),password also is same (123456abcd), type encryption “WPA”, auxiliary encryption is “AES” After setting this , we can visit the camera through wifi. Now we forward the port for cellphone , check the camera setting ,

Here is 18600, so we need forward this port in the router .

After setting this , we can visit the camera through cell phone soft on

You May Also Find These Documents Helpful

  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    If the problem still isn’t solved, check your scope configuration, and make sure the network/subnet mask match what is configured on the router that is connected to this local LAN.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    The IP config show you everything you need to know from your IP address and your gateway and basically it shows you your networking.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2

    • 310 Words
    • 2 Pages

    Question 6: Is the computer currently configured for DHCP? How can you tell? Yes. Click on the advanced tab and shows in Ethernet adapter Local Area Connection: DHCP Enabled…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 235 Words
    • 1 Page

    Now if that fixes the problem, then great. If not then you may need to check your scope configuration and make sure the network/subnet mask match what is configured on the router that you have connected to that particular LAN.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    6. To access the routers configuration, open a web browser and type in the wireless routers web address, the web address is usually provided by the manufacturer or type 192.168.1.1 and enter the administrator user…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    Task 4, Step 2: Paste a screenshot AFTER you execute the “show ip route” command (2 points)…

    • 436 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 3

    • 257 Words
    • 1 Page

    7. What is the IP address of the DHCP server from which W2K8yy has obtained its IP address?…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    The 5-11 error code can occur when there is a firewall or an anti-virus conflict So if you receive this error message then the first step to try is disabling the firewall settings.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Clear the screen and use cat to display the contents of the /etc/networks file. Capture the Element K desktop in the text box below.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    McCahill, M. (2002) The Surveillance Web: The Rise of Visual Surveillance in an English City, Collumpton: Willan.…

    • 2698 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Mgs 2 Dog Tags

    • 317 Words
    • 2 Pages

    grab the box in this area and use it in the conveyor, it will take you to another area unequip the box and the camera is around here…

    • 317 Words
    • 2 Pages
    Satisfactory Essays