Canon network camera VBM620D User Manual
Have a look at the manual Canon network camera VBM620D User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
[SSL/TLS] Setting HTTP Communication Encryption 81 Setting Page 4 (6) [Display Server Certificate Details] Click [Exec] to view the details of the server certificate. (7) [Display Self CA Certificate] Used for the purpose of testing SSL communications, but otherwise not normally used. (8) [Backup] Click [Exec] to perform a backup of the certificates and private key. This operation can only be performed when [HTTPS Connection Policy] is set to use [HTTPS] or [HTTP and HTTPS], and SSL communications are in use. (9) [Restore] Installs the certificates and private key from backup. Click [Browse] to select the backup file, then click [Exec]. This operation can only be performed when [HTTPS Connection Policy] is set to use [HTTPS] or [HTTP and HTTPS], and SSL communications are in use. The restored certificate will take effect after rebooting. Encrypted Communications (1) [HTTPS Connection Policy] Select whether or not to use SSL communications with HTTPS connections. To not use SSL communications, select [HTTP]. To use SSL communications, select [HTTPS] or [HTTP and HTTPS]. SSL connections will be possible after rebooting. When [HTTPS] is selected, even HTTP connections will be redirected to HTTPS and SSL communications will be used. Note It may take a few minutes to generate an SSL key. Depending on the type of the certificate being installed on the camera, a dialog box may appear indicating that the web browser has accepted the certificate and a connection can be made. If the dialog box does not appear, register the CA certificate in the web browser. Important Even if SSL communications are set here to be used, they will not be used if the certificate is not installed. Video transmission performance will drop, if SSL communications are used. When [HTTPS] is selected, communication with RM is not possible.
82 802.1X Authentication (1) [802.1X Authentication] Set 802.1X authentication to [Disable] or [Enable]. If [802.1X Authentication] is set to [Enable] and [Exec] is clicked, “Before changing the setting, set 802.1X authentication to “Disable”.” is displayed below the setting items and all settings are disabled, including changing the authentication method and installation/ deletion of certificates. To change settings, first set [802.1X Authentication] to [Disable] and click [Exec]. (2) [Authentication Status] Display the status of 802.1X authentication. There are three types of status: [Authenticated], [Unauthenticated], and [Stop]. Authentication Method (1) [Authentication Method] Select from [EAP-MD5], [EAP-TLS], [EAP-TTLS], and [EAP-PEAP] for the 802.1X authentication method. (2) [User Name] Enter the user name used for authentication. (3) [Password] Enter the required password for authentication. This is displayed only when [Authentication Method] is set to [EAP-MD5], [EAP-TTLS], or [EAP-PEAP].Certificate Information This is displayed only when [Authentication Method] is set to [EAP-TLS], [EAP-TTLS], or [EAP-PEAP]. (1) [CA Certificate Status] If no CA certificate is installed, [Not Installed] is displayed. If a CA certificate is installed, the validity period of the certificated is displayed. (2) [Client Certificate Status] If no client certificate is installed, [Not Installed] is displayed. If a client certificate is installed, the validity period of the certificated is displayed. This is displayed only when [Authentication Method] is set to [EAP-TLS]. (3) [Client Private Key Status] If no client private key is installed, [Not Installed] is displayed. If a client private key is installed, [Installed] is displayed. This is displayed only when [Authentication Method] is set to [EAP-TLS]. Certificate Management This is displayed only when [Authentication Method] is set to [EAP-TLS], [EAP-TTLS], or [EAP-PEAP]. (1) [Install CA Certificate] Installs a CA certificate. Select the certificate file to be installed using [Browse] and click [Exec]. (2) [Install Client Certificate] Installs a client certificate. Select the certificate file to be installed using [Browse] and click [Exec]. This is displayed only when [Authentication Method] is set to [EAP-TLS]. (3) [Install Client Private Key] Installs a client private key. Select the private key file to be installed using [Browse] and click [Exec]. This is displayed only when [Authentication Method] is set to [EAP-TLS]. (4) [Client Private Key Password] Enter the password for the client private key. Required when a password has been configured for the private key. This is displayed only when [Authentication Method] is set to [EAP-TLS]. [802.1X] Network Port Authentication Settings The following can be set here. 802.1X Authentication Display the 802.1X authentication enable/disable control and status. Authentication Method Set the authentication method used for 802.1X authentication. Certificate Information Display the certificate used for 802.1X authentication and the private key installation status. Certificate Management Manage the certificates and private keys used for 802.1X authentication.
[802.1X] Network Port Authentication Settings 83 Setting Page 4 (5) [Delete Certificate] Deletes all installed CA certificates, client certificates, and client private keys. Only “CA Certificate” is displayed when [Authentication Method] is set to [EAP-TTLS] or [EAP-PEAP], but any installed client certificates and client private keys are also deleted. Important If any CA certificates, client certificates, and client private keys already exist, they are discarded and new versions are installed. An error occurs if the format of the certificate or private key to be installed is incorrect. Client certificates and client private keys are checked as a pair when installing, and an error occurs if they do not match. The certificate and private key used for 802.1X authentication must be installed as separate items, irrespective of the installation status of certificates for SSL/TLS.
84 Memory Card Operations (unmount status) (1) [Mount/Unmount] In unmount status, [Mount] will appear. Click [Mount] to mount the MEMORY card. Note SD, SDHC and SDXC memory cards can be used with the camera. When an MEMORY card is inserted in the card slot, it is mounted automatically. It is also mounted automatically if inserted in the camera at the time of booting. For inserting and removing the MEMORY card, see “Installation Guide” > “Using an Memory Card”. (2) [Operation Settings] Set write operations to the MEMORY card to [Save Log] or [Save Logs and Videos]. Note The following settings and operations will record video on an memory card. - When a network error occurs during recording-mode stream - When uploading fails - When [Video Record Action] in the [Event] menu (p. 71) is set to [Record to Memory Card], and an event (volume detection, external device input or timer) setting is enabled and [Enable] is selected for [Video Record] - When video is recorded due to an intelligent function event occurrence (p. 113) - When manually recorded to memory card from the Admin Viewer (p. 159) New files cannot be saved to the memory card if there is no free space. (3) [Video Format] Select the [JPEG] or [H.264(1)] video format to make recordings to a memory card. Video is recorded with the settings defined under [Video] > [H.264(1)] (p. 62). [H.264(2)] cannot be used. Video is recorded in this format when [Record to Memory Card] is selected in [Event] > [Video Record Action] (p. 71). Note When [JPEG] is selected in [Video Format] and an upload error occurs, the frame rate of video recorded in JPEG format is always 1 fps. When a network error occurs during recording-mode stream, video is saved in the JPEG format regardless of the [Video Format] setting (the frame rate is fixed at 1 fps). Video size and quality of the recorded video are made according to the settings in the [Video] menu. (4) [Pre-event Buffer (number of frames)] / [Pre-event Buffer (sec)] Enter the number of frames or seconds of video to be buffered before the event. The maximum amount is number of frames for a [JPEG] selection and number of seconds for an [H.264(1)] selection in [Video Format]. (5) [Post-event Buffer (number of frames)] / [Post-event Buffer (sec)] Enter the number of frames or seconds of video to be buffered after the event. The maximum amount is number of frames for a [JPEG] selection and number of seconds for an [H.264(1)] selection in [Video Format]. (6) [Overwrite videos] Select [Enable] or [Disable] for the overwrite setting of video that is recorded to an memory card when an event occurs. If you select [Enable], videos recorded using an event and timer will be overwritten. Overwriting is performed when the number of videos that can be stored (100,000 files) for each of events and timers is exceeded. Overwriting is not performed when there is insufficient space on the memory card. (7) [Format] Click [Exec] to format the memory card. Formatting erases all files and directories on the memory card. [Memory Card] Memory Card Operations and Settings The following can be set here. Memory Card Operations Perform MEMORY card operations. Memory Card Information Display information about the MEMORY card. Important When an H.264 video is saved to an memory card, the following restrictions apply to [H.264(1)] of [Video] (p. 62). - Only [Use bit rate control] can be selected for [Bit Rate Control]. - Only [3072] or less can be selected for [Target Bit Rate (kbps)]. - Only one of [0.5], [1], and [1.5] can be selected for [I Frame Interval (sec)]. Since the [Pre-event Buffer] and [Post-event Buffer] set the maximum value, it may not be possible to record the specified number of frames or seconds of video depending on conditions.
[Memory Card] Memory Card Operations and Settings 85 Setting Page 4 Note The quick formatting method is used. Memory Card Operations (mount status) (1) [Mount/Unmount] In mount status, [Unmount] will appear. Click [Unmount] to unmount the memory card. (2) [Operation Settings], [Video Format], [Pre-event Buffer], [Post-event Buffer], [Overwrite videos] These settings are the same as in “Memory Card Operations (unmount status)”. (3) [Delete Videos] Click [Exec] to delete videos from the memory card. During deletion, an indicator will appear to the right of [Exec]. Note It may take 40 minutes or more to delete videos from the memory card. Deleting videos takes time, so it is recommended that you stop video transmission and upload processes. (4) [Recreate Video Management Information] Click [Exec] to recreate the video management information. During re-creation, an indicator will appear to the right of [Exec]. The memory card is inaccessible during this time. Note It may take 90 minutes or more to recreate video management information. Recreating video management information takes time, so it is recommended that you stop video transmission and upload processes. Memory Card Information (1) [Memory Card Recognition] Displays the status of the memory card. The three status messages are [Memory Card Not Inserted], [Not Mounted] and [Mounted]. (2) [Memory Card Operation Status] Displays the operation status of the memory card. The three status messages are as follows. [Operable]: This status indicates that any operation may be performed. [Recreating video management information]: This status indicates that video management information is being recreated. Other operations cannot be performed. [Deleting videos]: This status indicates that videos are being deleted. Other operations cannot be performed. (3) [Video Management Information Status] Displays the status of the video management information. The two status messages are as follows. [Normal]: This status indicates that video management information is normal. [Video Management Information Recreation Required]: This status indicates that management files are corrupted or not consistent with saved video files. It is necessary to click [Exec] in [Recreate Video Management Information] to recreate video management information. If the management files are not recreated even when [Recreate Video Management Information] is used, [Format] (p. 84) must be used. (4) [Video Saving] Displays whether or not videos can be saved to the memory card. [Can Save]: Indicates that videos can be saved to the memory card. [Cannot Save]: Indicates that videos cannot be saved to the memory card. This status may be caused when the memory card is not mounted, the video file count upper limit has been reached, the video management file is corrupted or the card is write-protected. (5) [Memory Card Capacity (KB)] Displays the memory card storage capacity. (6) [Used Capacity (KB)] Displays information about storage used on the memory card. Important Be sure to perform the unmount process when turning off the power to the camera or removing the memory card. Failing to unmount first may result in management file problems or the memory card becoming inaccessible. You can use the Camera Management Tool (p. 28) to mount/ unmount memory cards from multiple cameras at the same time.
86 Note For accessing files saved to the memory card, see “Memory Card Access” (p. 162). Important Information recorded to the memory card may be regarded as “personal information”. Take sufficient precautions for handling this information when releasing to third parties for disposal, transfer or repair.
87 4 Setting Page (1) [LAN] LAN interface, maximum packet size settings (p. 50) (2) [IPv4] IP address, IPv4 settings, etc. (p. 50) (3) [IPv6] Settings regarding IPv6 (p. 51) (4) [Installation Conditions] Dome setting (p. 59) (5) [HTTP Server] Authentication method, HTTP, and HTTPS port settings (p. 70) [Reboot Item] Setting Items Requiring Rebooting The following settings that require rebooting before changes take effect can be found on a single page. LAN, IPv4, IPv6, Installation Conditions (VB-H43/ VB-M42 only), HTTP Server Important These settings relate to network connectivity*. If any setting is changed to a value that may disable camera connection from the active web browser, a dialog box appears and alerts the user. Click [OK] to apply the new setting. Depending on the new setting, it may not be possible to connect to the camera again after rebooting. If this happens, a candidate URI for reconnecting the camera will appear if available. Try the URI displayed to reconnect the camera. If you cannot connect to the camera through the displayed URI, contact your System Administrator. * [LAN Interface], [Maximum Packet Size], [IPv4 Address Setting Method], [IPv4 Address], [Subnet Mask], [IPv6], [Auto (RA)], [Auto (DHCPv6)], [IPv6 Address (Manual)], [Prefix Length], [HTTP Port] and [HTTPS Port].
88 Device Information [Model Name], [Firmware Version], [Serial Number], [Build Number], [MAC address] Displays information about the currently connected camera. Tool (1) [View Logs] Display a history of camera operations and connections to each viewer, etc. (2) [View Current Settings] Display a list of current settings. (3) [Reboot] The camera is rebooted. (4) [Restore Default Settings] Except for the following items, all user-defined settings will be discarded and restored to factory default settings after the camera is rebooted. – Administrator password – Network LAN, IPv4, IPv6 – Date and time – Host access restrictions for access control – SSL/TLS –802.1X (5) [Back Up Settings] Back up all settings, other than the date and time, to a memory card.The IP address, SSL or 802.1X certificates, and private key files are also backed up. (6) [Restore Settings] Restore all settings, other than the date and time, from a backup file on a memory card. The IP address, SSL or 802.1X certificates, and private key files are also restored. The camera reboots after settings are restored. Note It is recommended that you back up all current setting values before restoring factory default settings in [Restore Default Settings]. The camera can be restored to factory default settings using the reset switch as well. Note, however, that this will reset all camera settings to factory default settings except for date and time (p. 181). Log Notifications (1) [Use log notifications] Set log notifications to [Disable] or [Enable]. Log messages, such as when errors occur, can be sent by [Maintenance] Viewing Current Settings, Event Logs and Performing Maintenance The following items can be used here. Device Information Display information about the current device. Display or Initialize Camera Settings, and Back Up/Restore Settings. Log Notifications Set log message mail notifications. Caution You must not turn off the camera while it is performing the [Restore Default Settings], [Back Up Settings] or [Restore Settings] operation. Turning off the camera at this stage may result in making it unable to boot correctly. Never touch the camera head during initialization. Initialization failure or malfunction may result. Important If the restored settings were backed up from a different camera, note that an address conflict on the network may occur. When restoring settings on a camera, do not use backup files that were created with firmware versions newer than that of the camera.
[Maintenance] Viewing Current Settings, Event Logs and Performing Maintenance 89 Setting Page 4 e-mail when [Enable] is selected. For details on log messages, see [List of Log Messages] (p. 168). (2) [Notification Level] Select [Error], [Errors and warnings], or [All] for the log message notification level. For details on log messages, see [List of Log Messages] (p. 168). (3) [Copy E-mail Settings] Copy the mail settings used in [Upload] > [E-mail Notification] (p. 68). (4) [Mail Server Name] Enter the host name or IP address of the SMTP server (using up to 63 characters). (5) [Mail Server Port] Enter the port number of the SMTP server (factory default setting is [25]). (6) [Sender (From)] Set the e-mail address of the sender (using up to 63 characters). (7) [Recipient (To)] Set the e-mail address of the recipient (using up to 63 characters). (8) [Authentication] Select [None], [POP before SMTP] or [SMTP-AUTH] for the e-mail authentication method. Set an appropriate method according to the authentication method used by the SMTP server to send to. [User Name], [Password], [POP Server] If [POP before SMTP] is selected as the e-mail authentication mode, enter the user name and password as well as the host name or IP address of the POP server required for authentication. [User Name], [Password] If [SMTP-AUTH] is selected as the e-mail authentication method, enter the user name and password required for authentication. (9) [Subject] Enter the subject of the e-mail to be sent using up to 31 ASCII characters. (10)[Log Notification Test] Clicking [Exec] initiates a log notification test based on the settings currently entered. It is not necessary to click [Apply].After entering a password, first click [Exec], then [Apply] the password.