Canon network camera VBR13 VE User Manual
Have a look at the manual Canon network camera VBR13 VE User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Setting Page 5 201 Select whether an ON event or OFF event triggers a linked event in [Status]. [External Device Input] Select External Device Input 1 or 2 in [External Device Inpu t], and then select an active event or inactive event to trigger a linked event in [Status]. [Timer] Select the timer event number to use in [Timer]. [Intelligent Function] Select the Intelligent Function detection setting number (P . 176) to use in [Intelligent Function], then select whether an ON event or OFF event trigge rs a linked event in [Status]. Note You cannot set the same event type for [Event 1] and [Event 2]. However, a combination of [Input 1] and [Input 2] can be specif ied for [External Device Input] and a combination of [T imer 1] to [Timer 4] can be set for [Timer]. Operation Set the operations to be performed when linked events are triggered. [ON Event Operation] If [Enable] is set, [Preset] , [Video Record] and [E-mail Notification] will be executed according to their settings when a linked event (ON event) is triggered. [OFF Event Operation] If [Enable] is set, [Preset] , [Video Record] and [E-mail Notification] will be executed according to their settings when a linked even t (OFF event) is completed. [Ongoing ON Event Operation] Select the operations to be perf ormed when an ON event is triggered. If [Enable] is selected, [Video Record] and [E-mail Notification] will be executed according to their settings during the linked event. [Preset] If you specify a preset, the camera angle will automatically move to the preset location when a linked event is triggered. It is necessary to set presets beforehand with [Camera] > [Preset] (P. 131). Note [Preset] cannot be configured when [Intelligent Function] is included in [Event Type]. [Video Record] Select whether to record video depending on the linked event. If you select [Enable] and a linked event is triggered, video will be transmitted to the recording destination specified in [Video Record] > [Upload] > [Video Record Action] (P. 156). [E-mail Notification] Select whether to send an e-mail not ification depending on the linked event. If you select [Enable] and a linked event is triggered, an e-mail notification will be sent. To use e-mail notification, you must set [Video Re cord] > [E-mail Notification] (P. 160) beforehand. [External Device Output for ON Event] Select whether external device output (1 or 2) is active or inactive when an ON event is triggered. [External Device Output for OFF Event] Select whether external device output (1 or 2) is active or inactive when an OFF event is triggered. [Audio Playback at ON Event] If you select [Enable], the sound clip specified in [Sound Clip] will play back when a linked event is triggered. [Audio Playback at OFF Event] If you select [Enable], the sound clip specified in [Soun d Clip] will play back when a linked event completes. Note [Audio Playback at ON Event] and [Audio Playback at OFF Event] can only be set when [Ev ent Type] in [Event 1] and [Event 2] is set to [External Device Input] or [Intelligent Function]. R13M50 R13M50 R13M50 M50R13
202 [Sound Clip] Select the sound clip when [Audio Playback at ON Event] or [Audio Playback at OFF Event] has been set to [Enable]. You must register the sound clip with [Video and Audio] > [Audio] (P. 148) beforehand. [Volume] Enter the volume fo r the sound clip. Linked Event Operation Examples This shows linked event status examples according to the ON/OFF combinations for Event 1 and Event 2. In the examples below, [Event Gap] is four seconds and each cell in the graphs below represents one second. [Event Linking Method] Set to [OR] Only One Event ON Both Events ON [Event Linking Method] is Set to [AND], [Event Order] is Specified This shows examples when [Event Order] is set to [Event 1 -> 2]. When [Event Order] is set to [None] and [Event Linking Meth od] is set to [AND], linked events will be as in the examples, even if Event 1 and Event 2 are switched. When Events Occur in Order 1 -> 2 When Events Occur in Order 2-> 1 -> 2 ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF Both events are ON, but their order of occurrence is incorrect. Therefore, a linked event does not occur here.
Setting Page 5 203 Event 2 Triggered but Event Gap Setting ([4] sec.) Exceeded [Status] of Event 1 Set to [OFF], ON States Do Not Coincide One Event Switches Between ON/OFF ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF The gap between the occurrence of event 2 after the occurrence of event 1 exceeds the value specified for the [Event Gap] setting. Therefore, a linked event does not occur. Event Gap (4 Sec. in This Example) ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF The linked event does not occur when event 1 turns OFF, but at the moment event 2 turns ON. Event Gap (4 Sec. in This Example) ON Event 1 Event 2 Consolidated State OFF ON OFF ON OFF Event Gap (4 Sec. in This Example)
204 Separate access control from IPv4 and IPv6 addresses can be set. Note If the same address is duplicated, the address policy that is displayed highest on the list will be applied. IPv4 Host Access Restrictions Specify the hosts from which IPv4 access is permitted and prohibited. [Apply Host Access Restrictions] Select whether to use IPv4 host access restrictions. [Default Policy] Select whether to allow or block access from IPv4 addresses that have not been specified in [Network Address / Subnet]. [Network Address / Subnet] Enter IPv4 addresses into the list and select [Yes] or [No] for access for each address. You can specify the subnet to set acce ss restrictions by network or host. If set to [No], access to all ports is blocked. [Security] > [Host Restrictions] Setting Access Restrictions Important To prohibit access via a proxy serv er in HTTP connection, a proxy server address must be set. If host access restriction is set mistakenly, access to the Setting Pages themselves may be prohibited, in which case restoring the factory default settings will b ecome the only means of recovery. The following settings can be configured here. IPv4 Host Access Restrictions IPv6 Host Access Restrictions
Setting Page 5 205 IPv6 Host Access Restrictions Specify the hosts from which IPv6 access is permitted and prohibited. [Apply Host Access Restrictions] Select whether to use IPv6 host access restrictions. [Default Policy] Select whether to allow or block access from IPv6 addresses that have not been specified in [Prefix / Prefix Length]. [Prefix / Prefix Length] Enter IPv6 addresses (prefixes) into the list an d select [Yes] or [No] for access for each address. You can specify the prefix length to se t access restriction by network or host. If set to [No], access to all ports is blocked.
206 Certificate creation and management, and encrypted communication settings. Certificates Create an SSL/TLS certificate. [Create Self-Signed Certificate] Enter the following items, click [Apply], and click [Exec] to create a self-signed certificate. Follow the displayed message and reboot. The certificate created will take effect after rebooting. Note Creating a certificate takes time, so it is recommended that you stop video transmission and upload processes. [Certificate Status] If no certificate is installed, [Not Installed] will be displayed. If a certificate is installed, the validity period for the c ertificate will be displayed. [Country (C)] Enter the ISO3166-1 alpha-2 country code. [State/Province (ST)], [Locality (L )], [Organization (O)], [Organizational Unit (OU)], [Common Name (CN)] Enter state/province name, locality, organization name, or ganizational unit and common name in alphanumeric characters (spaces or printable characters). Enter an FQDN format host name, etc. to set the common name (required). [Validity Period Start Date], [Validity Period End Date] Set the validity period of the certificate to be crea ted (required when creating a self-signed certificate). [Security] > [SSL/TLS] Setting HTTP Communication Encryption Important Use a self-signed certificate when complete security does not need to be ensured, such as through operation tests. For system operation, it is recommended that you acquire and install a certificate issued by a CA. The following settings can be configured here. Certificates Certificate Management Encrypted Communications
Setting Page 5 207 Certificate Management Manage the SSL/TLS certificate. [Generate Certificate Signing Request] Click [Exec] to create a server private key and generate a certificate signing request. Once processed, the certificate signing request will be displayed in a separate window. Note Generating a certificate signing request takes time, so it is recommended that y ou stop video transmission and upload processes . [Display Certificate Signing Request] Click [Exec] to view the details of the certificate signing request. [Install Server Certificate] Perform this operation to in stall a server certificate. Specify the certificate file to be inst alled using [Browse] and click [Exec]. The certificate installed will take effect after rebooting. [Install Intermediate Certificate] Perform this operation to inst all an intermediate certificate. Specify the certificate file to be inst alled using [Browse] and click [Exec]. The certificate installed will take effect after rebooting. Note To install an intermediate certificate and a cr oss root certificate, use a text editor or similar software to place them in the same file and install them as an intermediate certificate. [Delete Server Certificate] Click [Exec] to delete the server certificate. However, if SSL/TLS communications are enabled, the certificate cannot be deleted. Set [HTTPS Connection Policy] to [HTTP] before deleting a certificate. The deletion will take effect after rebooting. [Delete Intermediate Certificate] Click [Exec] to delete the in termediate certificate along with the cross root certificate. However, if SSL/TLS communications are enabled, the certificate cannot be deleted. Set [HTTPS Connection Policy] to [HTTP] before deleting a certificate. The deletion will take effect after rebooting. [Display Server Certificate Details] Click [Exec] to view the details of the server certificate. [Display Self CA Certificate] Used for the purpose of testing SSL/TLS co mmunications, but otherwise not normally used. [Backup] Click [Exec] to perform a backup of the certificates and pr ivate key. This can only be performed when [HTTPS] or [HTTP and HTTPS] is set for [HTTPS Connection Policy] to perform SSL/TLS communication. [Restore] Installs the certificates and private key from backup. Click [Browse] to specify the backup file, then click [Exec]. This can only be performed when [HTTPS] or [HTTP and HTTPS] is set for [HTTPS Connection Policy] to perform SSL/TLS communication. The restored certificate will take effect after rebooting. Encrypted Communications Set encrypted communications. [HTTPS Connection Policy] Set SSL/TLS communication with HTTPS connections. Select [HTTP] if you do not want to perform SSL/TLS communication. Select [HTTPS] or [HTTP and HTTPS] if you want to pe rform SSL/TLS communication. Connections using SSL/TLS are enabled after restarting.
208 If you select [HTTPS], HTTP access is also redirected to HTTPS to perform SSL/TLS communication. Note It may take a few minutes to generate an SSL/TLS key. Depending on the type of the certificate being installed on the camera, a dialog box may be displayed indicating that the web browser has accepted the certificate and a connection can be made. If the dialog box is not displayed, register the CA certificate in the web browser. Important Even if you set SSL/TLS communication here, SSL/TLS communi cation is not performed unless you install a certificate. Video distribution performance decreases when performing SSL/TLS communicati on. If you set [HTTPS], you cannot connect with the RM.
Setting Page 5 209 Settings for 802.1X authentication and authentication status display, and for certificate administration. 802.1X Authentication Display the 802.1X authentication enable/disable control and status. [802.1X Authentication] Select this to enable or disable 802.1X authentication. [Authentication Status] Display the status of 802.1X aut hentication. There are three types of status: [Authenticated], [Unauthenticated], and [Stop]. Authentication Method Set the authentication method us ed for 802.1X authentication. [Authentication Method] Select [EAP-MD5], [EAP-TLS], [EAP-TTLS], or [EAP-PEAP] as the authentication method to use for 802.1X authentication. [User Name] Enter the user name used for authentication. [Password] Enter the required pass word for authentication. This is displayed only when [Authentication Method ] is set to [EAP-MD5], [EAP-TTLS], or [EAP-PEAP]. Certificate Information This is displayed only when [Authentication Method] is set to [EAP-TLS], [EAP-TTLS], or [EAP-PEAP]. [CA Certificate Status] If no CA certificate is installed, [Not Installed] is displayed. If a CA certificate is installed, the validity period of the certificate is displayed. [Client Certificate Status] If no client certificate is installed, [Not Installed] is displayed. If a client certificate is inst alled, the validity period of the certificate is displayed. This is displayed only when [Authent ication Method] is set to [EAP-TLS]. [Security] > [802.1X] Network Port Authentication Settings The following settings can be configured here. 802.1X Authentication Authentication Method Certificate Information Certificate Management
210 [Client Private Key Status] If no client private key is installed, [Not Installed] is displayed. If a client private key is installed, [Installed] is displayed. This is displayed only when [Authent ication Method] is set to [EAP-TLS]. Certificate Management This is displayed only when [Authentication Method] is set to [EAP-TLS], [EAP-TTLS], or [EAP-PEAP]. [Install CA Certificate] Installs a CA certificate. Specify the certificate file to be inst alled using [Browse] and click [Exec]. [Install Client Certificate] Installs a client certificate. Specify the certificate file to be inst alled using [Browse] and click [Exec]. This is displayed only when [Authent ication Method] is set to [EAP-TLS]. [Install Client Private Key] Installs a client private key. Specify the private key file to be installed using [Browse] and click [Exec]. This is displayed only when [Authent ication Method] is set to [EAP-TLS]. [Client Private Key Password] Enter the password for the client private key. Required when a password has been configured for the private key. This is displayed only when [Authent ication Method] is set to [EAP-TLS]. [Delete Certificate] Deletes all installed CA certificates, clie nt certificates, and client private keys. Only “CA Certificate” is displayed when [Authentication Method] is set to [EAP-TTLS] or [EAP-PEAP], but any installed client certificates and c lient private keys are also deleted. Important If any CA certificates, client certificates , and client private keys already exist when installing certificates, they are discarded and new versions are installed. An error occurs if the format of the certificate or private key to be installed is incorrect. Client certificates and client private ke ys are checked as a pair when installing, and an error occurs if they do not match. The certificate and private key used for 802.1X authentication must be installed as separate items, irrespective of the installation status of certificates for SSL/TLS.