Home > Canon > Camera > Canon network camera VBM620D User Manual

Canon network camera VBM620D User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon network camera VBM620D User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							71
    4
    Setting Page
    Video Record Setting
    (1) [Video Record Action]
    Select the destination of a video recorded when an 
    event occurs. To record to a server selected on the 
    [Upload] in the setting page, select [Upload] and to 
    record to an memory card inserted in the camera, 
    select [Record to Memory Card].
    Note
    The size and format of video recorded according to the [Video 
    Record Action] settings are as follows:
    Settings must be made in the above setting page to make 
    an actual video recording.
    Volume Detection
    (1) [Volume Detection Event] 
    Set volume detection to [Disable] or [Enable]. 
    (2) [Detection Criteria] 
    Set the criteria for generating volume detection events 
    to [The reference volume level or above] or [The 
    reference volume level or below]. 
    (3) [Reference Volume Level] 
    Set the reference volume level for detection in the 
    range of 1 to 100. 
    Set the reference volume level by performing an 
    actual test while checking [Current Volume Level] 
    before configuring the setting.
    (4) [Current Volume Level]
    The current volume level appears on the status bar.
    The level set in [Reference Volume Level] is indicated 
    by a red mark.Volume below the reference level 
    appears in blue, that above the reference level 
    appears in red.
    (5) [Detect Criteria Duration (sec)] 
    Set the duration of the detect criteria in the range of 0 
    to 10 (sec.). When the status meeting the detect 
    criteria has continued for the duration or longer, an 
    ON event is generated. 
    (6) [ON Event Operation] 
    Select the operation to be performed upon an ON 
    event. If [Enable] is selected, (9) [Preset], (10) [Video 
    Record] and (11) [E-mail Notification] will be executed 
    according to their settings upon an ON event. 
    (7) [OFF Event Operation] 
    Select the operation to be performed upon an OFF 
    event. If [Enable] is selected, (9) [Preset], (10) [Video 
    [Event] 
    Setting Video Record, Volume Detection, External Device Output/Input, 
    Audio Playback and Timer
    The following can be set here. 
    Setting
    Set where video is recorded when an event 
    occurs.
     Volume Detection
    Set the operation to be performed at the time of 
    volume detection. 
     External Device Output
    Set external device output.
     External Device Input
    Set the operation to be performed when an event 
    is triggered by input from an external device. 
    
    Set timer events. 
    Sound Clip Upload
    Set the audio file registered as playback. 
    Important
    When using the upload function, or recording to the memory 
    card, do not change the settings in the [Setting Page]. Doing so 
    may result in the upload function or the recording to memory 
    card to stop.
    [Video Record 
    Action] settingsApplied video formatApplied video size
    [Upload] [Upload] > [Video 
    Format] settingsWhen the video format is 
    [JPEG],  [Video] > [JPEG] > 
    [Video Size: Upload / 
    Memory card]
    When the video format is 
    [H.264(1)], [Video] > 
    [H.264(1)] > [Video Size] [Record to 
    Memory Card][Memory Card] > 
    [Video Format] 
    settings 
    						
    							72
    Record] and (11) [E-mail Notification] will be executed 
    according to their settings upon an OFF event. 
    (8) [Ongoing ON Event Operation]
    Select the operation to be performed while a volume 
    detection event is ongoing. This can be set when [ON 
    Event Operation] is set to [Enable].
    Select [Enable] to perform operations according to 
    the (10) [Video Record] and (11) [E-mail Notification] 
    settings during an ongoing volume detection event.
    (9) [Preset]
    If a preset is specified, the camera will orient 
    automatically to the specified preset position when a 
    volume detection event occurs. To use presets, it is 
    necessary to set the presets with the Preset Setting 
    Tool under Admin Tools (p. 106). If there is no need 
    for additional camera operation, select [None]. 
    (10)[Video Record]
    Specify the video record action. If [Enable] is 
    selected, video will be transmitted to the destination 
    selected in [Video Record Action] (p. 71) when a 
    volume detection event occurs.
    (11)[E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification 
    is performed when a volume detection event occurs. 
    To use this function, [Upload] > [E-mail Notification ] 
    must also be set (p. 68).
    (12)[External Device Output for ON Event]
    Select whether external device output (1 or 2) is active 
    or inactive upon an ON event. Select [Disable] to 
    disable external device output.
    (13)[External Device Output for OFF Event]
    Select whether external device output (1 or 2) is active 
    or inactive upon an OFF event. Select [Disable] to 
    disable external device output.
    External Device Output(1) [Operation Mode]
    Select the normal (inactive) circuit condition.
    When [Normally Open] is selected, the output 
    terminals remain in the open state during normal 
    operation, and the terminals close upon an active 
    event and open upon an inactive event.
    When [Normally Close] is selected, the output 
    terminals remain in the closed state during normal 
    operation, and the terminals open upon an active 
    event and close upon an inactive event.
    (2) [Active Output Format]
    Select [Pulse] or [Continuous] for the external device 
    output format.
    (3) [Pulse Output Time (sec)]
    Enter the pulse output time in the range of 1 to 120 
    (sec.). This setting is available when [Active Output 
    Format] is [Pulse].
    Note
    [Normally Open] means that the contacts are normally in the 
    open state (that the circuit is non-conductive), and [Normally 
    Close] means that the contacts are normally in the closed state 
    (that the circuit is conductive).
    External Device Input
    (1) [External Device Input Event] 
    Set external device input events to [Disable] or 
    [Enable]. Important
     The volume detection function is temporarily disabled during 
    audio file playback and audio transmission from the viewer.
     For notes on use of volume detection, see “Safety 
    Precautions” in “Precautions for Use of Built-In Camera 
    Functions and Included Software” (p. 7).
     When Admin Viewer/VB Viewer has camera 
    control privileges, those camera control privileges are 
    released if the camera is moved to a preset position, 
    specified in the [Preset] settings, by a volume detection 
    event operation.
    Important
    When [Active Output Format] is set to [Pulse] and a timer is 
    used, a single contact output is controlled when the timer starts.
    Normally Open
    Active Event
    Inactive Event1 (Terminals close)
    0 (Terminals open)
    Normally Close
    Inactive Event
    Active Event1 (Terminals close)
    0 (Terminals open) 
    						
    							[Event] Setting Video Record, Volume Detection, External Device Output/Input, Audio Playback and Timer
    73
    Setting Page
    4
    (2) [Operation Mode]
    Select the circuit condition of the connected external 
    device.
    When [Normally Open] is selected, an active event 
    occurs when the terminals of the external device 
    close, and an inactive event occurs when the 
    terminals open.
    When [Normally Close] is selected, an active event 
    occurs when the terminals of the external device 
    open, and an inactive event occurs when the 
    terminals close.
    (3) [Active Event Operation] 
    Select the operation to be performed upon an active 
    event. If [Enable] is selected, (6) [Preset], (7) [Video 
    Record] and (8) [E-mail Notification] will be executed 
    according to their settings upon an active event. 
    (4) [Inactive Event Operation] 
    Select the operation to be performed upon an inactive 
    event. If [Enable] is selected, (6) [Preset], (7) [Video 
    Record] and (8) [E-mail Notification] will be executed 
    according to their settings upon an inactive event.
    (5) [Ongoing Active Event Operation]
    Select the operation to be performed while an active 
    event is ongoing. This can only be set when [Active 
    Event Operation] is set to [Enable].
    Select [Enable] to perform operations according to 
    the (7) [Video Record] and (8) [E-mail Notification] 
    settings during an ongoing active event.
    (6) [Preset]
    If a preset is specified, the camera will automatically 
    orient to the specified preset position when an 
    external device input event occurs. To use presets, it 
    is necessary to set presets with the Preset Setting Tool 
    under Admin Tools (p. 106). If there is no need for 
    additional camera operation, select [None]. 
    (7) [Video Record]
    Specify the video record action. If [Enable] is 
    selected, video will be transmitted to the destination 
    selected in [Video Record Action] (p. 71) when an 
    external device input event occurs.
    (8) [E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e - ma i l 
    notification will be performed when an external 
    d ev i ce  i n p ut  e v en t  o cc u r s . To use this function, 
    [Upload] > [E-mail Notification] must also be set 
    (p. 68).
    (9) [External Device Output for Active Event]
    Select whether external device output (1 or 2) is active 
    or inactive upon an active event. Select [Disable] to 
    disable external device output.(10)[External Device Output for Inactive Event]
    Select whether external device output (1 or 2) is active 
    or inactive upon an inactive event. Select [Disable] to 
    disable external device output.
    (11)[Audio Playback at Active Event] 
    Select the audio playback operation to be performed 
    upon an active event. If [Enable] is selected, the audio 
    designated in [Sound Clip] will playback when the 
    external device input becomes active. 
    (12)[Audio Playback at Inactive Event] 
    Select the audio playback operation to be performed 
    upon an inactive event. If [Enable] is selected, the 
    audio designated in [Sound Clip] will playback when 
    the external device input becomes inactive.
    (13)[Sound Clip] 
    Select the sound clip to be played. For registration of 
    sound clips, see p. 74. 
    (14)[Volume] 
    Select the volume of sound clips using an integer of 1 
    to 100. The greater the value, the louder the volume 
    becomes. 
    (15)[Day/Night Mode Switching]
    Select the Day/Night Mode switching behavior when 
    an external device input event is triggered.
    When [Switch to Day Mode] is selected, switches to 
    Day Mode when an active event is triggered, and 
    switches to Night Mode when an inactive event is 
    triggered.
    When [Switch to Night Mode] is selected, switches to 
    Night Mode when an active event is triggered, and 
    switches to Day Mode when an inactive event is 
    triggered.
    Select [Disable] to disable Day/Night Mode switching.
    Timer
    Important
     When [Day/Night] in the Admin Viewer is set to [Auto], Day/
    Night Mode switching will not happen when an external 
    device input event is triggered (p. 155).
     Camera control privileges are released if any of the following 
    actions occur while the Admin Viewer/VB Viewer has camera 
    control privileges.
    – If the camera angle is moved according to 
    the [Preset] settings
    – If the Day/Night Mode is switched using [Day/Night Mode 
    Switching]. 
    						
    							74
    (1) [Timer Event] 
    Select [Disable] or [Enable] for timer event. 
    (2) [Start Time] 
    Set the start time of the timer event in 24-hour format. 
    (3) [End Time]
    Set the end time of the timer event in the 24-hour 
    format.
    (4) [Repeat Interval] 
    Select [1 sec.] [5 sec.] [10 sec.] [30 sec.] [1 min.] 
    [5 min.] [10 min.] [15 min.] [20 min.] [30 min.] [1 hour] 
    [3 hours] [6 hours] or [12 hours] for the timer event 
    repeat intervals. Select [None] if an operation need 
    not be repeated.
    (5) [Video Record]
    Specify the video record action. When [Enable] is 
    selected, video will be transmitted to the destination 
    selected in [Video Record Action] (p. 71) when a timer 
    event occurs.
    (6) [E-mail Notification] 
    Select the e-mail notification operation to be 
    performed. If [Enable] is selected, e-mail notification 
    is performed when a timer event occurs. To use this 
    function, [Upload] > [E-mail Notification] must also be 
    set (p. 68).
    (7) [External Device Output]
    Select whether external device output (1 or 2) is active 
    or inactive when a timer event occurs. Select [Disable] 
    to disable output to an external device.
    (8) [Day/Night Mode Switching] 
    Select the Day/Night Mode switching behavior when a 
    timer event is triggered. 
    Select [Switch to Day Mode] to switch to Day Mode at 
    the start time, and Night Mode at the end time.
    Select [Switch to Night Mode] to switch to Night Mode 
    at the start time, and Day Mode at the end time.
    Select [Disable] to disable Day/Night Mode switching.
    Note
    When using timers that run continuously for 24 hours with a 
    [Repeat Interval] of 30 seconds or less, set the timer start and 
    end times so the timers can run continuously.Example:
    Sound Clip Upload
    (1) [Browse File] 
    Specify the audio file you want to register as the 
    sound clip, and then 
    click [Add]. 
    (2) [Sound Clip Name] 
    Set a name for the audio file to be registered as sound 
    playback (up to 15 alphanumeric characters). If a 
    blank field is applied, the sound clip will be deleted. 
    To delete a registered audio file, click [Delete] next to 
    the sound clip name you want to delete.
    Note
    Audio files must be 20 seconds or shorter and must be “.wav” 
    files (µ-law PCM 8 bits sampling frequency 8000 Hz, monaural). 
    Audio file samples are provided in the SOUND folder on the 
    Setup CD-ROM.
    Important
     [Day/Night Mode Switching] can only be set in [Timer 1].
     [External Device Output] and [Day/Night Mode Switching] do 
    not support [Repeat Interval].
     When [Day/Night] in the Admin Viewer is set to [Auto], Day/
    Night Mode switching will not happen when a timer event is 
    triggered (p. 155).
     If the [Day/Night Mode Switching] settings switch Day/Night 
    Mode while the Admin Viewer/VB Viewer is assigned camera 
    control, control will be released.
    Timer[Start Time][End Time][Repeat Interval]
    [Timer 1] 0:00 12:00 10 sec
    [Timer 2] 12:00 0:00 10 sec 
    						
    							75
    4
    Setting Page
    Administrator Password
    For details on [Password] and [Confirm Password], 
    please refer to [Network] > [Administrator Password] 
    (p. 50) .
    [Administrator Password] is the same. If you set one 
    [Administrator Password], the setting will be reflected in 
    the other [Administrator Password].
    Authorized User Account
    (1) [User Name], [Password] 
    Enter the user name and password and then click 
    [Add]. The authorized user will be added to the user 
    list. 
    The user name can consist of up to 15 (single-byte) 
    characters using A to Z, a to z, 0 to 9, “-” (hyphen) and 
    “_” (underscore). 
    The password can consist of 6 to15 (single-byte) 
    ASCII characters (space or printable characters). 
    (2) [User List] 
    A list of authorized users is shown. User authorities 
    can be set for these users. Up to 50 users can be 
    registered in addition to the Administrator (root). 
    Also, the user list can be sorted using the S T 
    buttons on the right. 
    To delete a user, select the applicable user from the 
    user list and then click [Delete]. User Authority
    [Privileged Camera Control], [Camera Control], [Video 
    Distribution], [Audio Distribution] 
    Set the user authorities of authorized users and guest 
    users. Select the checkboxes corresponding to the 
    items you want to permit for each user. 
    Note
    Authorized users have higher authorities than guest users. 
    For details, see “User Authorities and Camera Control Privileges” 
    (p. 136).
    IPv4 Host Access Restrictions
    (1) [Apply Host Access Restrictions] 
    Set IPv4 host access restrictions to [Disable] or 
    [Enable]. 
    (2) [Default Policy] 
    If IPv4 host access restrictions are applied, select 
    [Authorize Access] or [Prohibit Access] for the default 
    policy. 
    (3) [Network Address / Subnet] 
    Create a list of permitted hosts and restricted hosts 
    and set IPv4 address access for each host to [Yes] or 
    [No]. 
    You can specify the subnet and set access 
    restrictions by network or host. 
    If access is prohibited, access to all ports is 
    restricted. 
    [Access Control] Setting User Access Privileges 
    The following can be set here. 
     Administrator Password
    Set the administrator password.
     Authorized User Account
    Register who can access this camera. 
    
    Set the authorities for authorized users and guest 
    users. 
     IPv4 Host Access Restrictions
    Specify the hosts from which IPv4 access is 
    permitted and restricted. 
     IPv6 Host Access Restrictions
    Specify the hosts from which IPv6 access is 
    permitted and restricted. 
    Important
     To prohibit access via a proxy server in HTTP connection, a 
    proxy server address must be set. 
     If host access restriction is set mistakenly, access to the 
    setting pages themselves may be prohibited, in which case 
    restoring the factory default settings will become the only 
    means for recovery.  
    						
    							76
    Note
    If the same address is duplicated, the policy for the address that 
    appears highest on the list will be applied. 
    IPv6 Host Access Restrictions
    (1) [Apply Host Access Restrictions] 
    Set IPv6 host access restrictions to [Disable] or 
    [Enable]. 
    (2) [Default Policy] 
    If IPv6 host access restrictions are applied, select 
    [Authorize Access] or [Prohibit Access] for the default 
    policy. 
    (3) [Prefix / Prefix Length] 
    Create a list of permitted hosts and restricted hosts 
    and set IPv6 address access for each host to [Yes] or 
    [No]. 
    You can specify the prefix length and set access 
    restriction by network or host. 
    If access is prohibited, access to all ports is 
    restricted.  
    						
    							77
    4
    Setting Page
    IPsec 
    (1) [IPsec] 
    Key settings for use with IPsec can be selected as 
    [Auto Key Exchange] or [Manual].
    Auto Key Exchange Settings
    (1) [IPsec SA Encryption Algorithm] 
    Set the IPsec SA encryption algorithm to [AES
    ->3DES], [AES->3DES->DES] or [AES->3DES->DES 
    ->NULL]. 
    The specified algorithm will be checked for an 
    applicable encryption algorithm starting from the left. 
    (2) [IPsec SA Authentication Algorithm] 
    Set the IPsec SA authentication algorithm to 
    [HMAC_SHA1_96] or [HMAC_SHA1_96-> 
    HMAC_MD5_96]. 
    The specified algorithm will be checked for an 
    applicable authentication algorithm starting from the 
    left. 
    (3) [IPsec SA Validity Period (min)] 
    Set the duration of validity for IPsec SA (factory default 
    setting is [480]). 
    (4) [ISAKMP SA Encryption Algorithm] 
    Set the SA encryption algorithm for use with auto key 
    exchange protocol IKE to [AES->3DES] or [AES-> 
    3DES->DES]. 
    (5) [ISAKMP SA Authentication Algorithm] 
    Set the SA authentication algorithm for use with auto 
    key exchange protocol IKE to [SHA1] or [SHA1
    ->MD5]. (6) [DH Group] 
    Select the key generation information for the DH 
    algorithm that will be used for key exchange via auto 
    key exchange protocol IKE. The security level 
    increases with higher group numbers.
    (7) [ISAKMP SA Validity Period (min)] 
    Set the duration of validity for ISAKMP SA (factory 
    default setting is [480]). 
    IPsec Set (Auto Key Exchange) 
    IPsec Sets 1 to 5 are available, and you can specify IPsec 
    settings for one communication device for each IPsec Set. 
    (1) [IPsec Set] 
    Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
    in IPv6]. 
    (2) [IPsec Mode] 
    Set IPsec mode to [Tunnel Mode] or [Transport 
    Mode]. 
    (3) [Destination IPv4 Address], [Destination IPv6 Address] 
    Enter the IP address of the connection destination. 
    (4) [Source IPv4 Address], [Source IPv6 Address] 
    Enter the IP address of the source. 
    (5) [Security Protocol] 
    Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. 
    If [ESP] is selected, enter only the setting items 
    relating to ESP. 
    If [AH] is selected, enter only the setting items relating 
    to AH.
    If [ESP and AH] is selected, enter all setting items. 
    (6) [Security Gateway IPv4 Address], [Security Gateway 
    IPv6 Address]
    If IPsec mode is set to [Tunnel Mode] in (2), set the IP 
    address of the security gateway. 
    (7) [Destination Subnet Mask Length] (IPv4), [Destination 
    Prefix Length] (IPv6) 
    This setting is required only if IPsec mode is set to 
    [Tunnel Mode] in (2). 
    If IPv6 is used, enter a desired prefix length for the 
    connection destination in the range of 16 to 128. 
    If IPv4 is used, enter a desired length in the range of 1 
    to 32. 
    [IPsec] Setting IPsec
    The following can be set here. 
    
    Set the IPsec setting method. 
     Auto Key Exchange Settings
    Set auto key exchange. 
    Set
    IP security can be specified through auto key 
    exchange or manual setting with up to five 
    communicating devices.  
    						
    							78
    (8) [IKE Pre-Shared Key] 
    Enter the pre-shared key for IKE (auto key exchange) 
    (up to 127 characters). 
    Note
    If auto key exchange is used, it will take approximately 5 to 10 
    seconds before communication with the camera starts. 
    IPsec Set (Manual) 
    IPsec Sets 1 to 5 are available, and you can specify IPsec 
    settings for one communication device for each IPsec Set. 
    (1) [IPsec Set] 
    Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
    in IPv6]. 
    (2) [IPsec Mode] 
    Set IPsec mode to [Tunnel Mode] or [Transport 
    Mode]. 
    (3) [Destination IPv4 Address], [Destination IPv6 Address] 
    Enter the IP address of the connection destination. 
    (4) [Source IPv4 Address], [Source IPv6 Address] 
    Enter the IP address of the source. 
    (5) [Security Protocol] 
    Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. 
    If [ESP] is selected, enter only the setting items 
    relating to ESP. 
    If [AH] is selected, enter only the setting items relating 
    to AH.
    If [ESP and AH] is selected, enter all setting items. 
    (6) [Security Gateway IPv4 Address], [Security Gateway 
    IPv6 Address]
    If [IPsec Mode] is set to [Tunnel Mode] in (2), set the 
    IP address of the security gateway. (7) [Destination Subnet Mask Length] (IPv4), [Destination 
    Prefix Length] (IPv6)
    This setting is required only if [IPsec Mode] is set to 
    [Tunnel Mode] in (2).
    If IPv6 is used, enter a desired prefix length for the 
    connection destination in the range of 16 to 128. 
    If IPv4 is used, enter a desired length in the range of 1 
    to 32. 
    zIf [Security Protocol] is set to [ESP] or [ESP and AH] in 
    (5), (8) [SA ESP Encryption Algorithm] to (15) [SA ESP 
    SPI (inbound)] must be set. 
    (8) [SA ESP Encryption Algorithm] 
    Set the ESP encryption algorithm to [AES], [3DES], 
    [DES] or [NULL] according to the encryption 
    algorithm supported by the device to connect to. 
    Normally [AES] or [3DES] is recommended. 
    (9) [SA ESP Authentication Algorithm] 
    Set the ESP authentication algorithm to 
    [HMAC_SHA1_96], [HMAC_MD5_96] or [No 
    Authentication] according to the authentication 
    algorithm supported by the device to connect to. 
    If [ESP] is used alone, [No Authentication] cannot be 
    selected.
    (10)[SA ESP Encryption Key (outbound)] 
    Set the SA encryption key for outbound. If [AES], 
    [3DES] or [DES] was selected in (8), set a 128-bit, 
    192-bit or 64-bit hexadecimal, respectively. This item 
    need not be set if [NULL] was selected.
    (11)[SA ESP Authentication Key (outbound)] 
    Set the SA authentication key for outbound. If 
    [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in (9), set a 160-bit or 128-bit hexadecimal, 
    respectively. This item need not be set if [No 
    Authentication] was selected. 
    (12)[SA ESP SPI (outbound)] 
    Set the SA SPI value for outbound. 
    Set a desired value in the range of 256 to 
    4294967295.
    (13)[SA ESP Encryption Key (inbound)] 
    Set the SA encryption key for inbound. 
    If [AES], [3DES] or [DES] was selected in (8), set a 
    128-bit, 192-bit or 64-bit hexadecimal, respectively. 
    This item need not be set if [NULL] was selected.
    (14)[SA ESP Authentication Key (inbound)] 
    Set the SA authentication key for inbound. 
    If [HMAC_SHA1_96] or [HMAC_MD5_96] was 
    selected in (9), set a 160-bit or 128-bit hexadecimal, 
    respectively. This item need not be set if [No 
    Authentication] was selected. 
    (15)[SA ESP SPI (inbound)] 
    Set the SA SPI value for inbound. 
    Set a desired value in the range of 256 to 
    4294967295. Since this setting is used as an ID for 
    Important
    If the camera is rebooted during auto key exchange 
    communication, a connection error may result after rebooting. 
    In this case, connect again.  
    						
    							[IPsec] Setting IPsec
    79
    Setting Page
    4
    identifying the SA, be careful not to specify an 
    inbound SPI whose value is already used in the SPI for 
    other ESP. 
    zIf [Security Protocol] was set to [AH] or [ESP and AH] in 
    (5), (16) [SA AH Authentication Algorithm] to (20) [SA 
    AH SPI (inbound)] must be set. 
    (16)[SA AH Authentication Algorithm] 
    Set the AH authentication algorithm to 
    [HMAC_SHA1_96] or [HMAC_MD5_96] according to 
    the authentication algorithm supported by the device 
    to connect to. 
    (17)[SA AH Authentication Key (outbound)] 
    Set the SA authentication key for outbound. If 
    [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in (16), set a 160-bit or 128-bit hexadecimal, 
    respectively. 
    (18)[SA AH SPI (outbound)] 
    Set the SA SPI value for outbound. 
    Set a desired value in the range of 256 to 
    4294967295.
    (19)[SA AH Authentication Key (inbound)] 
    Set the SA authentication key for inbound. If 
    [HMAC_SHA1_96] or [HMAC_MD5_96] was selected 
    in (16), set a 160-bit or 128-bit hexadecimal, 
    respectively. 
    (20)[SA AH SPI (inbound)] 
    Set the SA SPI value for inbound. 
    Set a desired value in the range of 256 to 
    4294967295. Since this setting is used as an ID for 
    identifying the SA, be careful not to specify an 
    inbound SPI whose value is already used in the SPI for 
    another AH. 
    Note
    If IPsec is used, video transmission performance drops.
    Important
     To run this camera with IPsec, the communicating devices 
    and network must be set beforehand. Contact your System 
    Administrator for these settings. 
     When connecting with IPsec, set the camera IP address 
    manually.
    For IPv4 addresses, use addresses set with [Network] > 
    [IPv4 Address Setting Method] > [Manual].
    For IPv6 addresses, use addresses set with [Network] > 
    [IPv6 Address (Manual)].
     If any setting is changed from the [IPsec] menu, the camera 
    may become inaccessible from the active web browser. 
    Check beforehand the precautions in “Important” in “[Reboot 
    Item] Setting Items Requiring Rebooting” (p. 87). 
    						
    							80
    Certificates
    (1) [Create Self-Signed Certificate] 
    After entering each of the following settings, click 
    [Exec] to create a self-signed certificate. Follow the 
    instructions in the message and reboot. The certificate 
    created will take effect after rebooting. 
    Note
    Creating a certificate takes time, so it is recommended that you 
    stop video transmission and upload processes.
    (2) [Certificate Status] 
    If no certificate is installed, [Not Installed] will appear. 
    If a certificate is installed, the validity period for the 
    certificate will appear. 
    (3) [Country (C)] 
    Enter the country code. 
    (4) [State/Province (ST)], [Locality (L)], [Organization (O)], 
    [Organizational Unit (OU)], [Common Name (CN)] 
    Enter state/province name, locality, organization 
    name, organizational unit and common name in ASCII 
    characters (spaces or printable characters). Enter a 
    FQDN format host name, etc. to set the common 
    name (required). 
    (5) [Validity Period Start Date], [Validity Period End Date] 
    Set the validity period of the certificate to be created in 
    the range of 2001/01/01 to 2031/12/31 (required when 
    creating a self-signed certificate). Certificate Management
    (1) [Generate Certificate Signing Request] 
    Click [Exec] to create server private key and generate 
    a certificate signing request. Once processed, the 
    certificate signing request will appear in a separate 
    window. 
    Note
    Generating a certificate signing request takes time, so it is 
    recommended that you stop video transmission and upload 
    processes.
    (2) [Display Certificate Signing Request] 
    Click [Exec] to view the details of the certificate 
    signing request. 
    (3) [Install Server Certificate] 
    Perform this operation to install a server certificate. 
    Click [Browse] to select the certificate file for 
    installation, then click [Exec]. The certificate installed 
    will take effect after rebooting. 
    (4) [Install Intermediate Certificate] 
    Perform this operation to install an intermediate 
    certificate. Select the certificate file to be installed 
    using the [Browse] button and click [Exec]. The 
    installed certificate will take effect after rebooting. 
    Note
    To install an intermediate certificate and a primary intermediate 
    certificate, use a text editor or similar software to place them in 
    the same file and install them as an intermediate certificate.
    (5) [Delete Certificate] 
    Click [Exec] to delete the server certificate. However, 
    if SSL communications are enabled, the certificate 
    cannot be deleted. Set [HTTPS Connection Policy] to 
    [HTTP] before deleting a certificate. The deletion will 
    take effect after rebooting. 
    [SSL/TLS] Setting HTTP Communication Encryption
    The following can be set here. 
     Certificates
    Create an SSL/TLS certificate. 
     Certificate Management
    Manage the SSL/TLS certificate. 
     Encrypted Communications
    Set the encrypted communication.Important
    With regard to security, it is recommended that you use a self-
    signed certificate where complete security does not need to be 
    ensured through operation tests, etc. For system operation, 
    acquire and install a certificate issued by a CA. 
    						
    All Canon manuals Comments (0)

    Related Manuals for Canon network camera VBM620D User Manual