Home > Canon > Camera > Canon network camera VBM600VE User Manual

Canon network camera VBM600VE User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon network camera VBM600VE User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							[Upload] Setting HTTP/FTP Upload and E-mail Notification
    5-17
    5
    Setting Page
    E-mail Notification
    (1) [Notification] 
    Select [Text Only] or [Text with Image] as the content 
    of notification. If [Upload] is set to [Upload Disabled], 
    [Text with Image] will not be available. 
    (2) [Mail Server Name] 
    Enter the host name or IP address of the SMTP server 
    (using up to 63 characters). 
    (3) [Mail Server Port] 
    Enter the port number of the SMTP server (factory 
    default setting is [25]). 
    (4) [Sender (From)] 
    Set the e-mail address of the sender (using up to 63 
    characters). 
    (5) [Recipient (To)] 
    Set the e-mail address of the recipient (using up to 63 
    characters). 
    (6) [Authentication] 
    Select [None], [POP before SMTP] or [SMTP-AUTH] 
    for the e-mail authentication method. 
    Set an appropriate method according to the 
    authentication method used by the SMTP server to 
    send to. 
    [User Name], [Password], [POP Server] 
    If [POP before SMTP] is selected as the e-mail 
    authentication mode, enter the user name and 
    password as well as the host name or IP address of 
    the POP server required for authentication. 
    [User Name], [Password]
    If [SMTP-AUTH] is selected as the e-mail 
    authentication method, enter the user name and 
    password required for authentication. (7) [Subject] 
    Enter the subject of the e-mail to be sent using up to 
    31 ASCII characters. 
    (8) [Message Body] 
    Enter the message (text) of the e-mail to be sent using 
    up to 255 ASCII characters. Parameters can be 
    specified with the “%” character (p. 8-4).
    (9) [E-mail Notification Test] 
    Clicking [Exec] initiates an e-mail notification test 
    based on the settings currently entered. It is not 
    necessary to click [Apply].
    After entering a password, first click [Exec], then 
    [Apply] the password. 
    						
    							5-18
    Image Server
    (1) [Maximum Number of Clients] 
    Set the maximum number of clients that can be 
    connected to the camera at the same time. Up to 30 
    clients can be set. 
    If 0 is set, connection is prohibited except for the 
    Administrator. 
    (2) [Camera Control Queue Length] 
    Set the maximum queue length for clients requesting 
    camera control privilege from the viewer. The 
    maximum number is 30. Enter an integer from 0 to 30. 
    If 0 is set, camera control is prohibited except for the 
    Administrator. 
    (3) [Maximum Connection Time (sec.)] 
    Set the time in seconds during which an individual 
    client can connect to the camera. The maximum 
    number is 65535. Enter an integer from 0 to 65535. If 0 
    is set, the connection time becomes unlimited. 
    (4) [Camera Control Time (sec.)] 
    Set the maximum time during which the viewer can 
    control the camera. The maximum number is 3600. 
    Enter an integer from 1 to 3600. Audio Server
    (1) [Audio Transmission from the Camera] 
    When [Enable] is selected, the audio input through the 
    microphone attached to the camera can be 
    transmitted to the Viewer. 
    (2) [Input Volume] 
    Set the volume of input for the microphone connected 
    to the camera in the range of 1 to 100. The greater the 
    value, the larger the input volume becomes. 
    (3) [Voice Activity Detection] 
    If [Enable] is selected, the audio transmission is 
    stopped temporarily when no audio is output. This 
    way, the load of the applicable network can be 
    reduced. 
    (4) [Audio Reception from Viewer] 
    If [Enable] is selected, the audio received from the 
    included RM Viewer can be output from the speaker 
    with amplifier connected to the camera. 
    (5) [Output Volume] 
    Set the volume of output for the speaker connected to 
    the camera in the range of 1 to 100. The greater the 
    value, the larger the output volume becomes. 
    (6) [Echo Canceller] 
    If [Enable] is selected, echo between the microphone 
    and speaker is suppressed.
    (7) [Audio Input] 
    Set the microphone input. Select [Line In], 
    [Microphone In (dynamic microphone)] or 
    [Microphone In (condenser microphone)]. 
    [Server] 
    Setting the Image Server, Audio Server and HTTP Server
    The following can be set here. 
    Server
    Set the image transmission from the camera. 
    Server
    Set the audio transmission/reception. 
    Server
    Set the authentication method, HTTP port and 
    web page delivery. 
    
    
    
     
    						
    							[Server] Setting the Image Server, Audio Server and HTTP Server
    5-19
    5
    Setting Page
    HTTP Server
    (1) [Authentication Method] 
    Set the authentication method used with the HTTP 
    server to [Basic Authentication] or [Digest 
    Authentication]. 
    (2) [HTTP Port] 
    Set the HTTP port number to 80 or in the range of 
    1024 to 65535. 
    Normally [80] (factory default setting) is used. (3) [HTTPS Port] 
    Set the HTTPS port number to 443 or in the range of 
    1024 to 65535. 
    Normally [443] (factory default setting) is used. 
    (4) [Global Address for the Web Page] 
    If a fixed global address is assigned to the camera 
    using the NAT function of the router, set the global 
    address and port number here. If [IP Address] is 
    selected, enter the IP address specified in the [IPv4 
    Address] field. If [Host Name] is selected, the host 
    name specified in [DNS] under [Network] will be used. 
    Set the necessary items under [DNS] (p. 5-6). 
    Caution
    Switch line in and microphone in on each setting page 
    according to the specification of the microphone 
    (p. 5-18). 
    Using the wrong input may damage the camera and/or 
    microphone. Be sure to configure settings correctly. 
    Important
     The volume, sound quality, etc., may change depending on 
    the characteristics of the microphone used. 
     If [Input Volume] or [Echo Canceller] settings are changed after 
    setting volume detection, check the detection setting again. 
     RM Viewer is needed to when setting [Audio Reception from 
    Viewer] to [Enable]. No sound will be output from the camera 
    when using this function with VB-M700/600/40 Viewer since 
    the viewer does not support transmitting sound.
     Connect a speaker with amplifier to the camera (“Audio 
    Input/Output Terminals” in the “Installation Guide”). 
     If [Enable] is selected under [Echo Canceller], the sound 
    quality or volume may be affected. Utilize this function as 
    necessary according to the installation environment and how 
    the camera is used. 
     When sending audio, carefully read the information in 
    “Important” under “Audio Input/Output Terminals” in the 
    “Installation Guide.”
    
    
    Important
     If the setting of [HTTP Port] or [HTTPS Port] is changed, the 
    camera may become inaccessible from the active web 
    browser. Check beforehand the precautions in “Important” in 
    “[Reboot Item] Setting Items Requiring Rebooting” (p. 5-32). 
     If [IP Address] is selected under [Global Address for the Web 
    Page], be sure to set both [IPv4 Address (global address for 
    the web page)] and [Port Number (global address for the 
    web page)]. If [Host Name] is selected, also be sure to set 
    [Host Name] under [DNS] in [Network] on the Setting page. 
    						
    							5-20
    Image Buffer
    (1) [Frame Rate] 
    Enter the frame rate of image to be uploaded. 
    (2) [Pre-event Buffer (number of image frames)] 
    Set the number of images to be buffered before the 
    event. 
    (3) [Post-event Buffer (number of image frames)] 
    Set the number of images to be buffered after the 
    event. Volume Detection
    (1) [Volume Detection Event] 
    Set volume detection to [Disable] or [Enable]. 
    (2) [Detection Criteria] 
    Set the criteria for generating volume detection events 
    to [The reference volume level or above] or [The 
    reference volume level or below]. 
    (3) [Reference Volume Level] 
    Set the reference volume level for detection in the 
    range of 0 to 100. 
    Perform an actual test at the volume level before 
    setting the value. 
    (4) [Detect Criteria Duration (sec)] 
    Set the duration of the detect criteria in the range of 0 
    to 10 (sec.). When the status meeting the detect 
    criteria has continued for the duration or longer, an 
    ON event is generated. 
    (5) [ON Event Operation] 
    Select the operation to be performed upon an ON 
    event. If [Enable] is selected, (7) [Preset] (VB-M40 
    only), (8) [Upload] and (9) [E-mail Notification] will be 
    executed according to their settings upon an ON 
    event. 
    (6) [OFF Event Operation] 
    Select the operation to be performed upon an OFF 
    event. If [Enable] is selected, (7) [Preset] (VB-M40 
    only), (8) [Upload] and (9) [E-mail Notification] will be 
    executed according to their settings upon an OFF 
    event. 
    (7) [Preset] 
    If a preset is specified, the camera will orient 
    automatically to the specified preset position when a 
    volume detection event occurs. To use presets, it is 
    necessary to set the presets with the Preset Setting 
    Tool under Admin Tools (p. 6-16). If there is no need 
    for additional camera operation, select [None]. 
    [Event] 
    Setting Image Buffer, Volume Detection, External Device Input, Audio 
    Playback and Timer
    The following can be set here. 
     Image Buffer
    Set the items associated with the temporary 
    saving of images in the image buffer. 
     Volume Detection
    Set the operation to be performed at the time of 
    volume detection. 
     External Device Input
    Set the operation to be performed when an event 
    is triggered by input from an external device. 
    
    Set timer events. 
    Sound Clip Upload
    Set the audio file registered as playback. 
    Important
     The maximum image buffer size capacity is approx. 6 MB. 
    If a large image size is set, the Frame Rate, Pre-event Buffer 
    and Post-event Buffer may not be achieved as specified 
    (p. 5-20). 
     If buffering cannot be achieved as specified, an event log 
    message appears (p. 5-33). 
    Before using a large image size, confirm that no messages 
    appear in the event log (p. 5-33). 
     Regardless of the image buffer frame rate setting, only a 
    single image will be uploaded when a timer event occurs. 
    						
    							[Event] Setting Image Buffer, Volume Detection, External Device Input, Audio Playback and Timer
    5-21
    5
    Setting Page
    (8) [Upload] 
    Select the upload operation to be performed. If 
    [Enable] is selected, upload is performed when a 
    volume detection event occurs. To use this function, 
    the [General Upload] sub-menu and [HTTP Upload] 
    or [FTP Upload] sub-menu must also be set from the 
    [Upload] menu (p. 5-15).
    (9) [E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification is 
    performed when a volume detection event occurs. To 
    use this function, the [E-mail Notification ] sub-menu 
    must also be set from the [Upload] menu (p. 5-17).
    External Device Input
    (1) [External Device Input Event] 
    Set external device input events to [Disable] or 
    [Enable]. 
    (2) [ON/OFF Input Inversion] 
    Select [Disable] or [Enable] for external device ON/
    OFF input inversion. If [Enable] is selected, ON input 
    from an external device will generate an OFF event.
    (3) [ON Event Operation] 
    Select the operation to be performed upon an ON 
    event. If [Enable] is selected, (5) [Preset] (VB-M40 
    only), (6) [Upload] and (7) [E-mail Notification] will be 
    executed according to their settings upon an ON 
    event. (4) [OFF Event Operation] 
    Select the operation to be performed upon an OFF 
    event. If [Enable] is selected, (5) [Preset] (VB-M40 
    only), (6) [Upload] and (7) [E-mail Notification] will be 
    executed according to their settings upon an OFF 
    event. 
    (5) [Preset] 
    If a preset is specified, the camera will automatically 
    orient to the specified preset position when an 
    external device input event occurs. To use presets, it 
    is necessary to set presets with the Preset Setting Tool 
    under Admin Tools (p. 6-16). If there is no need for 
    additional camera operation, select [None]. 
    (6) [Upload] 
    Select the upload operation to be performed. If 
    [Enable] is selected, upload is performed when an 
    external device input event occurs. To use this 
    function, the [General Upload] sub-menu and the 
    [HTTP Upload] or [FTP Upload] sub-menu must also 
    be set from the [Upload] menu (p. 5-15).
    (7) [E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e - m ai l  
    notification will be performed when an external 
    device input event occurs, provided that the 
    e ve n t   is   s et   t o   [ Enable]. To use this function, the [E-
    mail Notification] sub-menu must also be set from the 
    [Upload] menu (p. 5-17).
    (8) [Audio Playback at ON Event] 
    Select the audio playback operation to be performed 
    upon an ON event. If [Enable] is selected, the audio 
    designated in [Sound Clip] will playback when an ON 
    event is input from an external device. 
    (9) [Audio Playback at OFF Event] 
    Select the audio playback operation to be performed 
    upon an OFF event. If [Enable] is selected, the audio 
    designated in [Sound Clip] will playback when the 
    event input from an external device turns OFF.
    (10)[Sound Clip] 
    Select the sound clip to be played. For registration of 
    sound clips, see p. 5-22. 
    (11)[Volume] 
    Select the volume of sound clips using an integer of 1 
    to 100. The greater the value, the louder the volume 
    becomes. 
    Important
     The volume detection function is temporarily disabled during 
    audio file playback and audio transmission from RM Viewer.
     Volume detection and external device output cannot be 
    interlocked. 
     For notes on use of volume detection, see “Safety 
    Precautions” in “Precautions for Use of Built-In Camera 
    Functions and Included Software” (p. vii).
      When VB-M700/600/40 Viewer has camera control 
    privileges, those camera control privileges are released if the 
    camera is moved to a preset position, specified in the 
    [Preset] settings, by a volume detection event operation.
    Important
    When VB-M700/600/40 Viewer has camera control privileges, 
    those camera control privileges are released if the camera is 
    moved to a preset position, specified in the [Preset] settings, by 
    an external device input event operation. 
    						
    							5-22
    Timer
    (1) [Timer Event Setting] 
    Select [Disable] or [Enable] for timer event. 
    (2) [Start Time] 
    Set the start time of the timer event in 24-hour format. 
    (3) [Repeat Setting] 
    If [Enable] is selected, timer events will be generated 
    according to settings in (4) [Repeat Interval] and 
    (5) [Repeat Count]. 
    (4) [Repeat Interval] 
    Select [1 sec.] [5 sec.] [10 sec.] [30 sec.] [1 min.] 
    [5 min.] [10 min.] [15 min.] [20 min.] [30 min.] [1 hour] 
    [3 hours] [6 hours] or [12 hours] for the upload and e-
    mail notification repeat intervals. 
    (5) [Repeat Count] 
    Set the repeat count for uploads 
    and e-mail 
    notification
     in the range of 1 to 65535. 
    (6) [Upload] 
    Select the upload operation to be performed. If 
    [Enable] is selected, upload is performed at the set 
    intervals. To use this function, the [General Upload] 
    sub-menu and the [HTTP Upload] or [FTP Upload] 
    sub-menu must also be set from the [Upload] menu 
    (p. 5-15).
    (7) [E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification 
    is performed when a timer event occurs. To use this 
    function, the [E-mail Notification] sub-menu must also 
    be set from the [Upload] menu (p. 5-17).Sound Clip Upload
    (1) [Browse File] 
    Specify the audio file you want to register as the 
    sound clip, and then 
    click [Add]. 
    (2) [Sound Clip Name] 
    Set a name for the audio file to be registered as sound 
    playback (up to 15 alphanumeric characters). If a 
    blank field is applied, the sound clip will be deleted. 
    To delete a registered audio file, click [Delete] next to 
    the sound clip name you want to delete.
    Note
    Audio files must be 20 seconds or shorter and must be “.wav” 
    files (µ-law PCM 8 bits sampling frequency 8000 Hz, monaural). 
    Important
    [Timer Event Setting] repeats in a 24-hour cycle.
    When valid times set by multiple [Timer Event Setting] overlap, 
    the timer event with the latest [Start Time] setting becomes 
    effective. 
    The previously performed timer event stops until its Start Time 
    on the next day. 
    						
    							5-23
    5
    Setting Page
    Authorized User Account
    (1) [User Name], [Password] 
    Enter the user name and password and then click 
    [Add]. The authorized user will be added to the user 
    list. 
    The user name can consist of up to 15 (single-byte) 
    characters using A to Z, a to z, 0 to 9, “-” (hyphen) and 
    “_” (underscore). 
    The password can consist of 6 to15 (single-byte) 
    ASCII characters (space or printable characters). 
    (2) [User List] 
    A list of authorized users is shown. User authorities 
    can be set for these users. Up to 50 users can be 
    registered in addition to the Administrator (root). 
    Also, the user list can be sorted using the S T 
    buttons on the right. 
    To delete a user, select the applicable user from the 
    user list and then click [Delete]. User Authority
    [Privileged Camera Control], [Camera Control], [Image 
    Distribution], [Audio Distribution] 
    Set the user authorities of authorized users and guest 
    users. Select the checkboxes corresponding to the 
    items you want to permit for each user. 
    Note
    Authorized users have higher authorities than guest users. 
    For details, see “User Authorities and Camera Control Privileges” 
    (p. 7-2).
    IPv4 Host Access Restrictions
    (1) [Apply Host Access Restrictions] 
    Set IPv4 host access restrictions to [Disable] or 
    [Enable]. 
    (2) [Default Policy] 
    If IPv4 host access restrictions are applied, select 
    [Authorize Access] or [Prohibit Access] for the default 
    policy. 
    (3) [Network Address / Subnet] 
    Create a list of permitted hosts and restricted hosts 
    and set IPv4 address access for each host to 
    [Authorize] or [Prohibit]. 
    You can specify the subnet and set access 
    restrictions by network or host. 
    If access is prohibited, access to all ports is 
    restricted. 
    [Access Control] Setting User Access Privileges 
    The following can be set here. 
     Authorized User Account
    Register who can access this camera. 
    
    Set the authorities for authorized users and guest 
    users. 
     IPv4 Host Access Restrictions
    Specify the hosts from which IPv4 access is 
    permitted and restricted. 
     IPv6 Host Access Restrictions
    Specify the hosts from which IPv6 access is 
    permitted and restricted.  
    						
    							5-24
    Note
    If the same address is duplicated, the policy for the address that 
    appears highest on the list will be applied. 
    IPv6 Host Access Restrictions
    (1) [Apply Host Access Restrictions] 
    Set IPv6 host access restrictions to [Disable] or 
    [Enable]. 
    (2) [Default Policy] 
    If IPv6 host access restrictions are applied, select 
    [Authorize Access] or [Prohibit Access] for the default 
    policy. 
    (3) [Prefix / Prefix Length] 
    Create a list of permitted hosts and restricted hosts 
    and set IPv6 address access for each host to [Yes] or 
    [No]. 
    You can specify the prefix length and set access 
    restriction by network or host. 
    If access is prohibited, access to all ports is 
    restricted. 
    Important
     To prohibit access via a proxy server in HTTP connection, a 
    proxy server address must be set. 
     If host access restriction is set mistakenly, access to the 
    setting pages themselves may be prohibited, in which case 
    restoring the factory default settings will become the only 
    means for recovery.  
    						
    							5-25
    5
    Setting Page
    IPsec 
    (1) [IPsec] 
    Key settings for use with IPsec can be selected as 
    [Auto Key Exchange] or [Manual].
    Auto Key Exchange Settings
    (1) [IPsec SA Encryption Algorithm] 
    Set the IPsec SA encryption algorithm to [AES->3DES], 
    [AES->3DES->DES] or [AES->3DES->DES ->NULL]. 
    The specified algorithm will be checked for an 
    applicable encryption algorithm starting from the left. 
    (2) [IPsec SA Authentication Algorithm] 
    Set the IPsec SA authentication algorithm to 
    [HMAC_SHA1_96] or [HMAC_SHA1_96-> 
    HMAC_MD5_96]. 
    The specified algorithm will be checked for an 
    applicable authentication algorithm starting from the 
    left. 
    (3) [IPsec SA Validity Period (min)] 
    Set the duration of validity for IPsec SA (factory default 
    setting is [480]). 
    (4) [ISAKMP SA Encryption Algorithm] 
    Set the SA encryption algorithm for use with auto key 
    exchange protocol IKE to [AES->3DES] or [AES-> 
    3DES->DES]. 
    (5) [ISAKMP SA Authentication Algorithm] 
    Set the SA authentication algorithm for use with auto 
    key exchange protocol IKE to [SHA1] or [SHA1-
    >MD5]. (6) [DH Group] 
    Select [Group 2] or [Group 2->Group 1] for the key 
    generation information that will be used in the DH 
    algorithm for key exchange via auto key exchange 
    protocol IKE.
    (7) [ISAKMP SA Validity Period (min)] 
    Set the duration of validity for ISAKMP SA (factory 
    default setting is [480]). 
    IPsec Set (Auto Key Exchange) 
    IPsec Sets 1 to 5 are available, and you can specify IPsec 
    settings for one communication device for each IPsec Set. 
    (1) [IPsec Set] 
    Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
    in IPv6]. 
    (2) [IPsec Mode] 
    Set IPsec mode to [Tunnel Mode] or [Transport Mode]. 
    (3) [Destination IPv4 Address], [Destination IPv6 Address] 
    Enter the IP address of the connection destination. 
    (4) [Source IPv4 Address], [Source IPv6 Address] 
    Enter the IP address of the source. 
    (5) [Security Protocol] 
    Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. 
    If [ESP] is selected, enter only the setting items 
    relating to ESP. 
    If [AH] is selected, enter only the setting items relating 
    to AH.
    If [ESP and AH] is selected, enter all setting items. 
    (6) [Security Gateway IPv4 Address], [Security Gateway 
    IPv6 Address]
    If IPsec mode is set to [Tunnel Mode] in (2), set the IP 
    address of the security gateway. 
    (7) [Destination Subnet Mask Length] (IPv4), [Destination 
    Prefix Length] (IPv6) 
    This setting is required only if IPsec mode is set to 
    [Tunnel Mode] in (2). 
    If IPv6 is used, enter a desired prefix length for the 
    connection destination in the range of 16 to 128. 
    If IPv4 is used, enter a desired length in the range of 1 
    to 32. 
    [IPsec] Setting IPsec
    The following can be set here. 
    
    Set the IPsec setting method. 
     Auto Key Exchange Settings
    Set auto key exchange. 
    Set
    IP security can be specified through auto key 
    exchange or manual setting with up to five 
    communicating devices.  
    						
    							5-26
    (8) [IKE Pre-Shared Key] 
    Enter the pre-shared key for IKE (auto key exchange) 
    (up to 127 characters). 
    Note
    If auto key exchange is used, it will take approximately 5 to 10 
    seconds before communication with the camera starts. 
    IPsec Set (Manual) 
    IPsec Sets 1 to 5 are available, and you can specify IPsec 
    settings for one communication device for each IPsec Set. 
    (1) [IPsec Set] 
    Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
    in IPv6]. 
    (2) [IPsec Mode] 
    Set IPsec mode to [Tunnel Mode] or [Transport 
    Mode]. 
    (3) [Destination IPv4 Address], [Destination IPv6 Address] 
    Enter the IP address of the connection destination. 
    (4) [Source IPv4 Address], [Source IPv6 Address] 
    Enter the IP address of the source. 
    (5) [Security Protocol] 
    Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. 
    If [ESP] is selected, enter only the setting items 
    relating to ESP. 
    If [AH] is selected, enter only the setting items relating 
    to AH.
    If [ESP and AH] is selected, enter all setting items. (6) [Security Gateway IPv4 Address], [Security Gateway 
    IPv6 Address]
    If [IPsec Mode] is set to [Tunnel Mode] in (2), set the 
    IP address of the security gateway. 
    (7) [Destination Subnet Mask Length] (IPv4), [Destination 
    Prefix Length] (IPv6)
    This setting is required only if [IPsec Mode] is set to 
    [Tunnel Mode] in (2). 
    If IPv6 is used, enter a desired prefix length for the 
    connection destination in the range of 16 to 128. 
    If IPv4 is used, enter a desired length in the range of 1 
    to 32. 
    zIf [Security Protocol] is set to [ESP] or [ESP and AH] in 
    (5), (8) [SA ESP Encryption Algorithm] to (15) [SA ESP 
    SPI (inbound)] must be set. 
    (8) [SA ESP Encryption Algorithm] 
    Set the ESP encryption algorithm to [AES], [3DES], 
    [DES] or [NULL] according to the encryption 
    algorithm supported by the device to connect to. 
    Normally [AES] or [3DES] is recommended. 
    (9) [SA ESP Authentication Algorithm] 
    Set the ESP authentication algorithm to 
    [HMAC_SHA1_96], [HMAC_MD5_96] or [No 
    Authentication] according to the authentication 
    algorithm supported by the device to connect to. 
    If [ESP] is used alone, [No Authentication] cannot be 
    selected.
    (10)[SA ESP Encryption Key (outbound)] 
    Set the SA encryption key for outbound. If [AES], 
    [3DES] or [DES] was selected in (8), set a 128-bit, 
    192-bit or 64-bit hexadecimal, respectively. This item 
    need not be set if [NULL] was selected.
    (11)[SA ESP Authentication Key (outbound)] 
    Set the SA authentication key for outbound. If 
    [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in (9), set a 160-bit or 128-bit hexadecimal, 
    respectively. This item need not be set if [No 
    Authentication] was selected. 
    (12)[SA ESP SPI (outbound)] 
    Set the SA SPI value for outbound. 
    Set a desired value in the range of 256 to 
    4294967295.
    (13)[SA ESP Encryption Key (inbound)] 
    Set the SA encryption key for inbound. 
    If [AES], [3DES] or [DES] was selected in (8), set a 
    128-bit, 192-bit or 64-bit hexadecimal, respectively. 
    This item need not be set if [NULL] was selected.
    (14)[SA ESP Authentication Key (inbound)] 
    Set the SA authentication key for inbound. 
    If [HMAC_SHA1_96] or [HMAC_MD5_96] was 
    selected in (9), set a 160-bit or 128-bit hexadecimal, 
    respectively. This item need not be set if [No 
    Authentication] was selected. 
    Important
    If the camera is rebooted during auto key exchange 
    communication, a connection error may result after rebooting. 
    In this case, connect again.  
    						
    All Canon manuals Comments (0)

    Related Manuals for Canon network camera VBM600VE User Manual