Home > Canon > Camera > Canon network camera VBM40 User Manual

Canon network camera VBM40 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon network camera VBM40 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							[Event] Image Buffer, Volume Detection, Audio Playback and Timer Settings
    4-21
    4
    Setting Page
    8[Upload] 
    Select the upload operation to be performed. If 
    [Enable] is selected, upload is performed when a 
    volume detection event occurs. To use this function, 
    the [General Upload] sub-menu and [HTTP Upload] or 
    [FTP Upload] sub-menu must also be set from the 
    [Upload] menu (P. 4-15).
    9[E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification is 
    performed when a volume detection event occurs. To 
    use this function, the [E-mail Notification] sub-menu 
    must also be set from the [Upload ] menu (P. 4-17).
    External Device Input
    1[External Device Input Event] 
    Set external device input events to [Enable] or 
    [Disable]. 
    2[ON/OFF Input Inversion] 
    Select [Enable] or [Disable] for external device ON/
    OFF input inversion. If [Enable] is selected, ON input 
    from an external device will generate an OFF event.
    3[ON Event Operation] 
    Select the operation to be performed upon an ON 
    event. If [Enable] is selected, 5 [Preset], 6 [Upload] 
    and 7 [E-mail Notification] will be executed according 
    to their settings upon an ON event. 4[OFF Event Operation] 
    Select the operation to be performed upon an OFF 
    event. If [Enable] is selected, 5 [Preset], 6 [Upload] 
    and 7 [E-mail Notification] will be executed according 
    to their settings upon an OFF event. 
    5[Preset] 
    If a preset is specified, the camera will automatically 
    orient to the specified preset position when an external 
    device input event occurs. To use presets, it is 
    necessary to set presets with the Preset Setting Tool 
    under Admin Tools (P. 5-16). If there is no need for 
    additional camera operation, select [None]. 
    6[Upload] 
    Select the upload operation to be performed. If 
    [Enable] is selected, upload is performed when an 
    external device input event occurs. To use this 
    function, the [General Upload] sub-menu and [HTTP 
    Upload] or [FTP Upload] sub-menu must also be set 
    from the [Upload] menu (P. 4-15).
    7[E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification 
    will be performed when an external device input event 
    occurs, provided that the event is set to [Enable]. To 
    use this function, the [E-mail Notification] sub-menu 
    must also be set from the [Upload] (P. 4-17).
    8[Audio Playback at ON Event] 
    Select the audio playback operation to be performed 
    upon an ON event. If [Enable] is selected, the audio 
    designated in [Sound Clip] will playback when an ON 
    Event is input from an external device. 
    9[Audio Playback at OFF Event] 
    Select the audio playback operation to be performed 
    upon an OFF event. If [Enable] is selected, the audio 
    designated in [Sound Clip] will playback when the 
    event input from an external device turns OFF. 
    A q[Sound Clip] 
    Select the sound clip to be played. For registration of 
    sound clips, see P. 4-22. 
    A a[Volume] 
    Select the volume of sound clips using an integer of 1 
    to 100. The greater the value, the louder the volume 
    becomes. 
    Important
     The volume detection function is temporarily disabled during 
    audio file playback and audio transmission from RM Viewer.
     Volume detection and external device output cannot be 
    interlocked. 
     For notes on use of volume detection, see “Safety 
    Precautions” in “Precautions for Use of Intelligent Functions, 
    Image Stabilizer and Bundled Network Video Recording 
    Software RM-Lite” (P. x). 
    						
    							4-22
    Timer
    1[Timer Event Setting] 
    Select [Enable] or [Disable] for timer event. 
    2[Start Time] 
    Set the start time of the timer event in 24-hour format. 
    3[Repeat Setting] 
    If [Enable] is selected, timer events will be generated 
    according to settings in 4 [Repeat Interval], 5 
    [Repeat Count]. 
    4[Repeat Interval] 
    Select [1 sec.] [5 sec.] [10 sec.] [30 sec.] [1 min.] [5 
    min.] [10 min.] [15 min.] [20 min.] [30 min.] [1 hour] [3 
    hours] [6 hours] or [12 hours] for the upload and e-mail 
    notification repeat intervals.
    5[Repeat Count] 
    Set the repeat count for uploads and e-mail notification 
    in the range of 1 to 65535. 
    6[Upload] 
    Select the upload operation to be performed. If 
    [Enable] is selected, upload is performed at the set 
    intervals. To use this function, the [General Upload] 
    sub-menu and [HTTP Upload] or [FTP Upload] sub-
    menu must also be set from the [Upload] menu 
    (P. 4-15).
    7[E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification is 
    performed when a timer event occurs. To use this 
    function, the [E-mail Notification] sub-menu must also 
    be set from the [Upload] menu (P. 4-17).Sound Clip Upload
    1[Browse File] 
    Specify the audio file you want to register as the sound 
    clip, and then click [Add]. 
    2[Sound Clip Name] 
    Set a name for the audio file to be registered as the 
    sound clip (up to 15 alphanumeric characters). If a 
    blank field is applied, the sound clip will be deleted. To 
    delete a registered audio file, click [Delete] next to the 
    sound clip name you want to delete.
    Note
    Audio files must be 20 seconds or shorter and must be “.wav” 
    files (μ-law PCM 8 bits sampling frequency 8000 Hz, monaural). 
    Important
    [Timer Event Setting] repeats in a 24-hour cycle.
    When valid times set by multiple [Timer Event Setting] overlap, 
    the timer event with the latest [Start Time] setting becomes 
    effective.
    The previously performed timer event stops until its Start Time 
    on the next day. 
    						
    							4-23
    4
    Setting Page
    Authorized User Account
    1[User Name], [Password] 
    Enter the user name and password and then click 
    [Add]. The authorized user will be added to the user list. 
    The user name can consist of up to 15 (single-byte) 
    characters using A to Z, a to z, 0 to 9, “-” (hyphen) and 
    “_” (underscore). 
    The password can consist of 6 to15 (single-byte) ASCII 
    characters (space or printable characters). 
    2[User List] 
    A list of authorized users is shown. User authorities can 
    be set for these users. Up to 50 users can be 
    registered in addition to the Administrator (root). 
    Also, the user list can be sorted using the S T buttons 
    on the right. 
    To delete a user, select the applicable user from the 
    user list and then click [Delete]. User Authority
    [Privileged Camera Control], [Camera Control], [Image 
    Distribution], [Audio Distribution] 
    Set the user authorities of authorized users and guest 
    users. Select the checkboxes corresponding to the 
    items you want to permit for each user. 
    Note
    Authorized users have higher authorities than guest users. 
    For details, see “Chapter 6 User Authorities and Camera Control 
    Privileges” (P. 6-2). 
    IPv4 Host Access Restrictions
    1[Apply Host Access Restrictions] 
    Set IPv4 host access restrictions to [Disable] or 
    [Enable]. 
    2[Default Policy] 
    If IPv4 host access restrictions are applied, select 
    [Authorize Access] or [Prohibit Access] for the default 
    policy. 
    3[Network Address / Subnet] 
    Create a list of permitted hosts and restricted hosts and 
    set IPv4 address access for each host to [Authorize] or 
    [Prohibit]. 
    You can specify the subnet and set access restrictions 
    by network or host. 
    If access is prohibited, access to all ports is restricted. 
    [Access Control] Setting User Access Privileges 
    The following can be set here. 
     Authorized User Account
    Register who can access this camera. 
    
    Set the authorities for authorized users and guest 
    users. 
     IPv4 Host Access Restrictions
    Specify the hosts from which IPv4 access is 
    permitted and restricted. 
     IPv6 Host Access Restrictions
    Specify the hosts from which IPv6 access is 
    permitted and restricted.  
    						
    							4-24
    Note
    If the same address is duplicated, the policy for the address that 
    appears highest on the list will be applied. 
    IPv6 Host Access Restrictions
    1[Apply Host Access Restrictions] 
    Set IPv6 host access restrictions to [Disable] or 
    [Enable]. 
    2[Default Policy] 
    If IPv6 host access restrictions are applied, select 
    [Authorize Access] or [Prohibit Access] for the default 
    policy. 
    3[Prefix / Prefix Length] 
    Create a list of permitted hosts and restricted hosts and 
    set IPv6 address access for each host to [Yes] or [No]. 
    You can specify the prefix length and set access 
    restriction by network or host. 
    If access is prohibited, access to all ports is restricted. 
    Important
     To prohibit access via a proxy server in HTTP connection, a 
    proxy server address must be set. 
     If host access restriction is set mistakenly, access to the 
    setting pages themselves may be prohibited, in which case 
    restoring the factory default settings will become the only 
    means for recovery.  
    						
    							4-25
    4
    Setting Page
    IPsec 
    1[IPsec] 
    Key settings for use with IPsec can be selected as 
    [Auto Key Exchange] or [Manual].
    Auto Key Exchange Setting
    1[IPsec SA Encryption Algorithm] 
    Set the IPsec SA encryption algorithm to [AES->3DES], 
    [AES->3DES->DES] or [AES->3DES->DES->NULL]. 
    The specified algorithm will be checked for an 
    applicable encryption algorithm starting from the left. 
    2[IPsec SA Authentication Algorithm] 
    Set the IPsec SA authentication algorithm to 
    [HMAC_SHA1_96] or [HMAC_SHA1_96->HMAC_MD5_96]. 
    The specified algorithm will be checked for an 
    applicable authentication algorithm starting from the 
    left. 
    3[IPsec SA Validity Period (min)] 
    Set the duration of validity for IPsec SA (factory default 
    setting is [480]). 
    4[ISAKMP SA Encryption Algorithm] 
    Set the SA encryption algorithm for use with auto key 
    exchange protocol IKE to [AES->3DES] or 
    [AES->3DES->DES]. 
    5[ISAKMP SA Authentication Algorithm] 
    Set the SA authentication algorithm for use with auto 
    key exchange protocol IKE to [SHA1] or [SHA1->MD5]. 6[DH Group] 
    Select [Group 2] or [Group 2->Group 1] for the key 
    generation information that will be used in the DH 
    algorithm for key exchange via auto key exchange 
    protocol IKE. 
    7[ISAKMP SA Validity Period (min)] 
    Set the duration of validity for ISAKMP SA (factory 
    default setting is [480]). 
    IPsec Set (Auto Key Exchange) 
    IPsec Sets 1 to 5 are available, and you can specify IPsec 
    settings for one communication device for each IPsec Set. 
    1[IPsec Set] 
    Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
    in IPv6]. 
    2[IPsec Mode] 
    Set IPsec mode to [Tunnel Mode] or [Transport Mode]. 
    3[Destination IPv4 Address], [Destination IPv6 Address] 
    Enter the IP address of the connection destination. 
    4[Source IPv4 Address], [Source IPv6 Address] 
    Enter the IP address of the source. 
    5[Security Protocol] 
    Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. 
    If [ESP] is selected, enter only the setting items relating 
    to ESP. 
    If [AH] is selected, enter only the setting items relating 
    to AH. 
    If [ESP and AH] is selected, enter all setting items. 
    6[Security Gateway IP Address (IPv4/IPv6)] 
    If IPsec mode is set to [Tunnel Mode] in 2, set the IP 
    address of the security gateway. 
    7[Destination Subnet Mask Length (IPv4)], [Destination 
    Prefix Length (IPv6)] 
    This setting is required only if IPsec mode is set to 
    [Tunnel Mode] in 2. 
    If IPv6 is used, enter a desired prefix length for the 
    connection destination in the range of 16 to 128. 
    If IPv4 is used, enter a desired length in the range of 1 
    to 32. 
    [IPsec] IPsec Settings 
    The following can be set here. 
    
    Set the IPsec setting method. 
     Auto Key Exchange Setting
    Set auto key exchange. 
    Set
    IP security can be specified through auto key 
    exchange or manual setting with up to five 
    communicating devices.  
    						
    							4-26
    8[IKE Pre-Shared Key] 
    Enter the pre-shared key for IKE (auto key exchange)
    (up to 127 characters). 
    Note
    If auto key exchange is used, it will take approximately 5 to 10 
    seconds before communication with the camera starts. 
    IPsec Set (Manual) 
    IPsec Sets 1 to 5 are available, and you can specify IPsec 
    settings for one communication device for each IPsec Set. 
    1[IPsec Set] 
    Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
    in IPv6]. 
    2[IPsec Mode] 
    Set IPsec mode to [Tunnel Mode] or [Transport Mode]. 
    3[Destination IPv4 Address], [Destination IPv6 Address] 
    Enter the IP address of the connection destination. 
    4[Source IPv4 Address], [Source IPv6 Address] 
    Enter the IP address of the source. 
    5[Security Protocol] 
    Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. 
    If [ESP] is selected, enter only the setting items relating 
    to ESP. 
    If [AH] is selected, enter only the setting items relating 
    to AH. 
    If [ESP and AH] is selected, enter all setting items. 6[Security Gateway IPv4 Address], [Security Gateway 
    IPv6 Address] 
    If IPsec mode is set to [Tunnel Mode] in 2, set the IP 
    address of the security gateway. 
    7[Destination Subnet Mask Length (IPv4)], [Destination 
    Prefix Length (IPv6)] 
    This setting is required only if [IPsec Mode] is set to 
    [Tunnel Mode] in 2. 
    If IPv6 is used, enter a desired prefix length for the 
    connection destination in the range of 16 to 128. 
    If IPv4 is used, enter a desired length in the range of 1 
    to 32. 
     If [Security Protocol] is set to [ESP] or [ESP and AH] in 
    5, 8 [SA ESP Encryption Algorithm] to A
    g [SA ESP 
    SPI (inbound)] must be set. 
    8[SA ESP Encryption Algorithm] 
    Set the ESP encryption algorithm to [AES], [3DES], 
    [DES] or [NULL] according to the encryption algorithm 
    supported by the device to connect to. 
    Normally [AES] or [3DES] is recommended. 
    9[SA ESP Authentication Algorithm] 
    Set the ESP authentication algorithm to 
    [HMAC_SHA1_96], [HMAC_MD5_96] or [No 
    Authentication] according to the authentication 
    algorithm supported by the device to connect to. 
    If [ESP] is used alone, [No Authentication] cannot be 
    selected. 
    A q[SA ESP Encryption Key (outbound)] 
    Set the SA encryption key for outbound. If [AES], 
    [3DES] or [DES] was selected in 8, set a 128-bit, 
    192-bit or 64-bit hexadecimal, respectively. This item 
    need not be set if [NULL] was selected. 
    A a[SA ESP Authentication Key (outbound)] 
    Set the SA authentication key for outbound. If 
    [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in 9, set a 160-bit or 128-bit hexadecimal, 
    respectively. This item need not be set if [No 
    Authentication] was selected. 
    A s[SA ESP SPI (outbound)] 
    Set the SA SPI value for outbound. 
    Set a desired value in the range of 256 to 4294967295. 
    A d[SA ESP Encryption Key (inbound)] 
    Set the SA encryption key for inbound. 
    If [AES], [3DES] or [DES] was selected in 8, set a 
    128-bit, 192-bit or 64-bit hexadecimal, respectively. 
    This item need not be set if [NULL] was selected. 
    A f[SA ESP Authentication Key (inbound)] 
    Set the SA authentication key for inbound. 
    If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in 9, set a 160-bit or 128-bit hexadecimal, 
    respectively. This item need not be set if [No 
    Authentication] was selected. 
    Important
    If the camera is rebooted during auto key exchange 
    communication, a connection error may result after rebooting. 
    In this case, connect again.  
    						
    							[IPsec] IPsec Settings
    4-27
    4
    Setting Page
    A
    g[SA ESP SPI (inbound)] 
    Set the SA SPI value for inbound. 
    Set a desired value in the range of 256 to 4294967295. 
    Since this setting is used as an ID for identifying the 
    SA, be careful not to specify an inbound SPI whose 
    value is already used in the SPI for other ESP. 
     If [Security Protocol] was set to [AH] or [ESP and AH] in 
    5, A
    h [SA AH Authentication Algorithm] to S
    q [SA AH 
    SPI (inbound)] must be set. 
    A h[SA AH Authentication Algorithm] 
    Set the AH authentication algorithm to 
    [HMAC_SHA1_96] or [HMAC_MD5_96] according to 
    the authentication algorithm supported by the device to 
    connect to. 
    A j[SA AH Authentication Key (outbound)] 
    Set the SA authentication key for outbound. 
    If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in A
    h, set a 160-bit or 128-bit hexadecimal, 
    respectively. 
    A k[SA AH SPI (outbound)] 
    Set the SA SPI value for outbound. 
    Set a desired value in the range of 256 to 4294967295. 
    A l[SA AH Authentication Key (inbound)] 
    Set the SA authentication key for inbound. 
    If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in A
    h, set a 160-bit or 128-bit hexadecimal, 
    respectively. 
    S q[SA AH SPI (inbound)] 
    Set the SA SPI value for inbound. 
    Set a desired value in the range of 256 to 4294967295. 
    Since this setting is used as an ID for identifying the 
    SA, be careful not to specify an inbound SPI whose 
    value is already used in the SPI for other AH. 
    Note
    If IPsec is used, video transmission performance drops.
    Important
     To run this camera with IPsec, the communicating devices 
    and network must be set beforehand. Contact your System 
    Administrator for these settings. 
     If any setting is changed from the [IPsec] menu, the camera 
    may become inaccessible from the active web browser. 
    Check beforehand the precautions in “Important” in [Reboot 
    Item] Setting Items Requiring Rebooting (P. 4-32). 
    						
    							4-28
    Certificates
    1[Create Self-Signed Certificate] 
    After entering each of the following settings, click 
    [Exec] to create a self-signed certificate. Follow the 
    instructions in the message and reboot. The certificate 
    created will take effect after rebooting. 
    Note
    Creating a certificate takes time, so it is recommended that you 
    stop video transmission and upload processes.
    2[Certificate Status] 
    If no certificate is installed, “Not Installed” will appear. If 
    a certificate is installed, “Installed” will appear. 
    3[Country (C)] 
    Enter the country code. 
    4[State/Province (ST)], [Locality (L)], [Organization (O)], 
    [Organizational Unit (OU)], [Common Name (CN)] 
    Enter state/province name, locality, organization name, 
    organizational unit and common name in ASCII 
    characters (spaces or printable characters). Enter a 
    FQDN format host name, etc. to set the common name 
    (required). 
    5[Validity Period Start Date], [Validity Period End Date] 
    Set the validity period of the certificate to be created in 
    the range of 2001/01/01 to 2031/12/31 (required when 
    creating a self-signed certificate). Certificate Management
    1[Generate Certificate Signing Request] 
    Click [Exec] to create server private key and a self-
    certification authority private key to generate a 
    certificate signing request. Once processed, the 
    certificate signing request will appear in a separate 
    window. 
    Note
    Generating a certificate signing request takes time, so it is 
    recommended that you stop video transmission and upload 
    processes.
    2[Display Certificate Signing Request Details] 
    Click [Exec] to view the details of the certificate signing 
    request. 
    3[Install Server Certificate] 
    Perform this operation to install a server certificate. 
    Click [Browse] to select the certificate file for 
    installation, then click [Exec]. The certificate installed 
    will take effect after rebooting. 
    4[Install Intermediate CA Certificate]
    Perform this operation to install an intermediate CA 
    certificate. Select the certificate file to be installed 
    using the [Browse] button and click [Exec]. The 
    installed certificate will take effect after rebooting.
    5[Delete Certificate] 
    Click [Exec] to delete the certificate. However, if SSL 
    communications are enabled, the certificate cannot be 
    deleted. Set [SSL Communications] to [Disable] before 
    deleting a certificate. The deletion will take effect after 
    rebooting. 
    6[Display Server Certificate Details] 
    Click [Exec] to view the details of the certificate. 
    [SSL/TLS] HTTP Communication Encryption Settings 
    The following can be set here. 
     Certificates
    Create an SSL/TLS certificate. 
     Certificate Management
    Manage the SSL/TLS certificate. 
     Encrypted Communications
    Set the encypted communicationImportant
    With regard to security, it is recommended that you use a self-
    signed certificate where complete security does not need to be 
    ensured through operation tests, etc. For system operation, 
    acquire and install a certificate issued by a CA. 
    						
    							[SSL/TLS] HTTP Communication Encryption Settings
    4-29
    4
    Setting Page
    7[Self CA Certificate] 
    Used for the purpose of testing SSL communications, 
    but otherwise not normally used. 
    8[Backup] 
    Click [Exec] to perform a backup of the certificates and  
    private key. This operation can only be performed via 
    SSL communications. 
    9[Restore] 
    Installs the certificates and private key from backup. 
    Click [Browse] to select the backup file, then click 
    [Exec]. This operation can only be performed via SSL 
    communications, and will take effect after rebooting. 
    Encrypted Communications
    1[SSL Communications] 
    Set SSL communications to [Disable] or [Enable]. The 
    setting will take effect after rebooting. 
    However, if no certificate is installed, SSL 
    communications cannot be changed to [Enable]. 
    Note
     It may take 15 minutes or more to generate an SSL key. 
     If SSL communications are used, video transmission 
    performance drops.
     Depending on the type of the certificate being installed on the 
    camera, a dialog box may not appear indicating whether the 
    web browser has accepted the certificate and a connection 
    cannot be made. 
    In this case, the procedure below to register the CA certificate 
    in the web browser.  
    						
    							4-30
    SD Card Operation (unmount status) 
    1[Mount/Unmount] 
    In unmount status, [Mount] will appear. Click [Mount] to 
    mount the SD memory card. 
    Note
    SD and SDHC memory cards can be used with the VB-M40. 
    When an SD memory card is inserted in the card slot, it is 
    mounted automatically. It is also mounted automatically if 
    inserted in the camera at the time of booting. 
    For inserting and removing the SD memory card, see “Using an 
    SD Memory Card” in the “Installation Guide.” 
    2[Operation Settings] 
    Set write operations to the SD memory card to [Save 
    Log] or [Save Log and Images]. If [Save Log and 
    Images] is selected, when a network problem occurs 
    during uploading, images will be saved to the SD 
    memory card at a frame rate of 1 fps (with image size 
    and image quality set in [Video] (P. 4-13)). 
    3[Format] 
    Click [Exec] to format the SD memory card. SD Card Operation (mount status) 
    1[Mount/Unmount] 
    In mount status, [Unmount] will appear. Click 
    [Unmount] to unmount the 
    SD memory card. 
    2[Operation Settings] 
    These settings are the same as 2 [Operation settings] 
    in “SD Card Operation (unmount status).”
    3[Delete Images] 
    Click [Exec] to delete images from the SD memory 
    card. During deletion, an indicator will appear to the 
    right of [Exec]. 
    Note
     It may take 10 minutes or more to delete images from the SD 
    memory card. 
     Deleting images takes time, so it is recommended that you 
    stop video transmission and upload processes.
    4[Recreate Image Management Information] 
    Click [Exec] to recreate the image management 
    information. 
    During re-creation, an indicator will appear to the right 
    of [Exec]. The SD memory card is inaccessible during 
    this time. 
    Note
     It may take 20 minutes or more to recreate image management 
    information.
     Recreating image management information takes time, so it is 
    recommended that you stop video transmission and upload 
    processes.
    [Memory Card] SD Memory Card Operations and Settings 
    The following can be set here. 
    SD Card Operations
    Perform SD memory card operations. Items 
    displayed will differ according to the mount or 
    unmount status. 
    SD Card Information
    Display information about the SD memory card. 
    Important
    Be sure to perform the unmount process when turning off the 
    power to the camera or removing the SD memory card. Failing 
    to unmount first may result in management file problems or the 
    SD memory card becoming inaccessible.  
    						
    All Canon manuals Comments (0)

    Related Manuals for Canon network camera VBM40 User Manual