Canon network camera VBS905F User Manual
Have a look at the manual Canon network camera VBS905F User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
[Event] Setting Video Record, Volume Detection, External Device Output/Input and Timer 61 Setting Page 3 (8) [Ongoing ON Event Operation] Select the operation to be performed while a volume detection event is in progress. This can be set when [ON Event Operation] is set to [Enable]. If [Enable] is selected, (10) [Video Record] and (11) [E-mail Notification] will be executed according to their settings during the volume detection event. (9) [Preset] If a preset is specified, the camera will orient automatically to the specified preset position when a volume detection event occurs. To use presets, it is necessary to set the presets with the Preset Setting Tool under Admin Tools (p. 96). If there is no need for additional camera operation, select [None]. (10)[Video Record] Specify the video record action. If [Enable] is selected, video will be transmitted to the destination selected in [Video Record Action] (p. 60) when a volume detection event occurs. (11)[E-mail Notification] Select the e-mail notification operation to be performed. If [Enable] is selected, e-mail notification is performed when a volume detection event occurs. To use this function, [Upload] > [E-mail Notification ] must also be set (p. 57). (12)[External Device Output for ON Event] Select whether external device output is active or inactive upon an ON event. Select [Disable] to disable external device output. (13)[External Device Output for OFF Event] Select whether external device output is active or inactive upon an OFF event. Select [Disable] to disable external device output. External Device Output (1) [Operation Mode] Select the normal (inactive) circuit condition. When [Normally Open] is selected, the output terminals remain in the open state during normal operation, and the terminals close upon an active event and open upon an inactive event. When [Normally Close] is selected, the output terminals remain in the closed state during normal operation, and the terminals open upon an active event and close upon an inactive event. (2) [Active Output Format] Select [Pulse] or [Continuous] for the external device output format. (3) [Pulse Output Time (sec)] Enter the pulse output time in the range of 1 to 120 (sec.). This setting is available when [Active Output Format] is [Pulse]. Note [Normally Open] means that the contacts are normally in the open state (that the circuit is non-conductive), and [Normally Close] means that the contacts are normally in the closed state (that the circuit is conductive). External Device Input (1) [External Device Input Event] Set external device input events to [Disable] or [Enable]. (2) [Operation Mode] Select the circuit condition of the connected external device. When [Normally Open] is selected, an active event occurs when the terminals of the external device close, and an inactive event occurs when the terminals open. When [Normally Close] is selected, an active event occurs when the terminals of the external device Important For notes on use of volume detection, see “Safety Precautions” in “Precautions for Use of Built-In Camera Functions and Included Software” (p. 7). When Admin Viewer/VB Viewer has camera control privileges, those camera control privileges are released if the camera is moved to a preset position, specified in the [Preset] settings (VB-S30D/VB-S31D only), by a volume detection event operation. Important When [Active Output Format] is set to [Pulse] and a timer is used, a single contact output is controlled when the timer starts. Normally Open Active Event Inactive Event1 (Terminals close) 0 (Terminals open) Normally Close Inactive Event Active Event1 (Terminals close) 0 (Terminals open)
62 open, and an inactive event occurs when the terminals close. (3) [Active Event Operation] Select the operation to be performed upon an active event. If [Enable] is selected, (6) [Preset], (7) [Video Record] and (8) [E-mail Notification] will be executed according to their settings upon an active event. (4) [Inactive Event Operation] Select the operation to be performed upon an inactive event. If [Enable] is selected, (6) [Preset], (7) [Video Record] and (8) [E-mail Notification] will be executed according to their settings upon an inactive event. (5) [Ongoing Active Event Operation] Select the operation to be performed while an active event is in progress. This can only be set when [Active Event Operation] is set to [Enable]. If [Enable] is selected, (7) [Video Record] and (8) [E- mail Notification] will be executed according to their settings during the active event. (6) [Preset] If a preset is specified, the camera will automatically orient to the specified preset position when an external device input event occurs. To use presets, it is necessary to set presets with the Preset Setting Tool under Admin Tools (p. 96). If there is no need for additional camera operation, select [None]. (7) [Video Record] Specify the video record action. If [Enable] is selected, video will be transmitted to the destination selected in [Video Record Action] (p. 60) when an external device input event occurs. (8) [E-mail Notification] Select the e-mail notification operation to be performed. If [Enable] is selected, e - m ai l notification will be performed when an external device input event occurs. To use this function, [Upload] > [E-mail Notification] must also be set (p. 57). (9) [External Device Output for Active Event] Select whether external device output is active or inactive upon an active event. Select [Disable] to disable external device output. (10)[External Device Output for Inactive Event] Select whether external device output is active or inactive upon an inactive event. Select [Disable] to disable external device output. (11)[Day/Night Mode Switching] Select the Day/Night Mode switching behavior when an external device input event is triggered. When [Switch to Day Mode] is selected, switches to Day Mode when an active event is triggered, and switches to Night Mode when an inactive event is triggered.When [Switch to Night Mode] is selected, switches to Night Mode when an active event is triggered, and switches to Day Mode when an inactive event is triggered. Select [Disable] to disable Day/Night Mode switching. Timer (1) [Timer Event] Select [Disable] or [Enable] for timer event. (2) [Start Time] Set the start time of the timer event in 24-hour format. (3) [End Time] Set the end time of the timer event in the 24-hour format. (4) [Repeat Interval] Select [1 sec.] [5 sec.] [10 sec.] [30 sec.] [1 min.] [5 min.] [10 min.] [15 min.] [20 min.] [30 min.] [1 hour] [3 hours] [6 hours] or [12 hours] for the timer event repeat intervals. Select [None] if an operation need not be repeated. (5) [Video Record] Specify the video record action. When [Enable] is selected, video will be transmitted to the destination selected in [Video Record Action] (p. 60) when a timer event occurs. (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [Enable] is selected, e-mail notification is performed when a timer event occurs. To use this function, [Upload] > [E-mail Notification] must also be set (p. 57). (7) [External Device Output] Select whether external device output is active or inactive when a timer event occurs. Select [Disable] to disable output to an external device. Important When [Day/Night] in the Admin Viewer is set to [Auto], Day/ Night Mode switching will not happen when an external device input event is triggered (p. 144). Camera control privileges are released if any of the following actions occur while the Admin Viewer/VB Viewer has camera control privileges. – If the camera angle is moved according to the [Preset] settings – If the Day/Night Mode is switched using [Day/Night Mode Switching].
[Event] Setting Video Record, Volume Detection, External Device Output/Input and Timer 63 Setting Page 3 (8) [Day/Night Mode Switching] Select the Day/Night Mode switching behavior when a timer event is triggered. Select [Switch to Day Mode] to switch to Day Mode at the start time, and Night Mode at the end time. Select [Switch to Night Mode] to switch to Night Mode at the start time, and Day Mode at the end time. Select [Disable] to disable Day/Night Mode switching. Note When using timers that run continuously for 24 hours with a [Repeat Interval] of 30 seconds or less, set the timer start and end times so the timers can run continuously. Example: Important [Day/Night Mode Switching] can only be set in [Timer 1]. [External Device Output] and [Day/Night Mode Switching] do not support [Repeat Interval]. When [Day/Night] in the Admin Viewer is set to [Auto], Day/ Night Mode switching will not happen when a timer event is triggered (p. 144). If the [Day/Night Mode Switching] settings switch Day/Night Mode while the Admin Viewer/VB Viewer is assigned camera control, control will be released. Timer[Start Time][End Time][Repeat Interval] [Timer 1] 0:00 12:00 10 sec [Timer 2] 12:00 0:00 10 sec
64 Administrator Password For details on [Password] and [Confirm Password], please refer to [Network] > [Administrator Password] (p. 40) . [Administrator Password] is the same. If you set one [Administrator Password], the setting will be reflected in the other [Administrator Password]. Authorized User Account (1) [User Name], [Password] Enter the user name and password and then click [Add]. The authorized user will be added to the user list. The user name can consist of up to 15 (single-byte) characters using A to Z, a to z, 0 to 9, “-” (hyphen) and “_” (underscore). The password can consist of 6 to15 (single-byte) ASCII characters (space or printable characters). (2) [User List] A list of authorized users is shown. User authorities can be set for these users. Up to 50 users can be registered in addition to the Administrator (root). Also, the user list can be sorted using the S T buttons on the right. To delete a user, select the applicable user from the user list and then click [Delete]. User Authority [Privileged Camera Control], [Camera Control], [Video Distribution], [Audio Distribution] Set the user authorities of authorized users and guest users. Select the checkboxes corresponding to the items you want to permit for each user. Note Authorized users have higher authorities than guest users. For details, see “User Authorities and Camera Control Privileges” (p. 126). IPv4 Host Access Restrictions (1) [Apply Host Access Restrictions] Set IPv4 host access restrictions to [Disable] or [Enable]. (2) [Default Policy] If IPv4 host access restrictions are applied, select [Authorize Access] or [Prohibit Access] for the default policy. (3) [Network Address / Subnet] Create a list of permitted hosts and restricted hosts and set IPv4 address access for each host to [Yes] or [No]. You can specify the subnet and set access restrictions by network or host. If access is prohibited, access to all ports is restricted. [Access Control] Setting User Access Privileges The following can be set here. Administrator Password Set the administrator password. Authorized User Account Register who can access this camera. User Authority Set the authorities for authorized users and guest users. IPv4 Host Access Restrictions Specify the hosts from which IPv4 access is permitted and restricted. IPv6 Host Access Restrictions Specify the hosts from which IPv6 access is permitted and restricted. Important To prohibit access via a proxy server in HTTP connection, a proxy server address must be set. If host access restriction is set mistakenly, access to the setting pages themselves may be prohibited, in which case restoring the factory default settings will become the only means for recovery.
[Access Control] Setting User Access Privileges 65 Setting Page 3 Note If the same address is duplicated, the policy for the address that appears highest on the list will be applied. IPv6 Host Access Restrictions (1) [Apply Host Access Restrictions] Set IPv6 host access restrictions to [Disable] or [Enable]. (2) [Default Policy] If IPv6 host access restrictions are applied, select [Authorize Access] or [Prohibit Access] for the default policy. (3) [Prefix / Prefix Length] Create a list of permitted hosts and restricted hosts and set IPv6 address access for each host to [Yes] or [No]. You can specify the prefix length and set access restriction by network or host. If access is prohibited, access to all ports is restricted.
66 IPsec (1) [IPsec] Key settings for use with IPsec can be selected as [Auto Key Exchange] or [Manual]. Auto Key Exchange Settings (1) [IPsec SA Encryption Algorithm] Set the IPsec SA encryption algorithm to [AES- >3DES], [AES->3DES->DES] or [AES->3DES->DES- >NULL]. The specified algorithm will be checked for an applicable encryption algorithm starting from the left. (2) [IPsec SA Authentication Algorithm] Set the IPsec SA authentication algorithm to [HMAC_SHA1_96] or [HMAC_SHA1_96-> HMAC_MD5_96]. The specified algorithm will be checked for an applicable authentication algorithm starting from the left. (3) [IPsec SA Validity Period (min)] Set the duration of validity for IPsec SA (factory default setting is [480]). (4) [ISAKMP SA Encryption Algorithm] Set the SA encryption algorithm for use with auto key exchange protocol IKE to [AES->3DES] or [AES-> 3DES->DES]. (5) [ISAKMP SA Authentication Algorithm] Set the SA authentication algorithm for use with auto key exchange protocol IKE to [SHA1] or [SHA1- >MD5]. (6) [DH Group] Select the key generation information for the DH algorithm that will be used for key exchange via auto key exchange protocol IKE. The security level increases with higher group numbers. (7) [ISAKMP SA Validity Period (min)] Set the duration of validity for ISAKMP SA (factory default setting is [480]). IPsec Set (Auto Key Exchange) IPsec Sets 1 to 5 are available, and you can specify IPsec settings for one communication device for each IPsec Set. (1) [IPsec Set] Set IPsec Set to [Disable], [Enable in IPv4] or [Enable in IPv6]. (2) [IPsec Mode] Set IPsec mode to [Tunnel Mode] or [Transport Mode]. (3) [Destination IPv4 Address], [Destination IPv6 Address] Enter the IP address of the connection destination. (4) [Source IPv4 Address], [Source IPv6 Address] Enter the IP address of the source. (5) [Security Protocol] Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. If [ESP] is selected, enter only the setting items relating to ESP. If [AH] is selected, enter only the setting items relating to AH. If [ESP and AH] is selected, enter all setting items. (6) [Security Gateway IPv4 Address], [Security Gateway IPv6 Address] If IPsec mode is set to [Tunnel Mode] in (2), set the IP address of the security gateway. (7) [Destination Subnet Mask Length] (IPv4), [Destination Prefix Length] (IPv6) This setting is required only if IPsec mode is set to [Tunnel Mode] in (2). If IPv6 is used, enter a desired prefix length for the connection destination in the range of 16 to 128. If IPv4 is used, enter a desired length in the range of 1 to 32. [IPsec] Setting IPsec The following can be set here. Set the IPsec setting method. Auto Key Exchange Settings Set auto key exchange. Set IP security can be specified through auto key exchange or manual setting with up to five communicating devices.
[IPsec] Setting IPsec 67 Setting Page 3 (8) [IKE Pre-Shared Key] Enter the pre-shared key for IKE (auto key exchange) (up to 127 characters). Note If auto key exchange is used, it will take approximately 5 to 10 seconds before communication with the camera starts. IPsec Set (Manual) IPsec Sets 1 to 5 are available, and you can specify IPsec settings for one communication device for each IPsec Set. (1) [IPsec Set] Set IPsec Set to [Disable], [Enable in IPv4] or [Enable in IPv6]. (2) [IPsec Mode] Set IPsec mode to [Tunnel Mode] or [Transport Mode]. (3) [Destination IPv4 Address], [Destination IPv6 Address] Enter the IP address of the connection destination. (4) [Source IPv4 Address], [Source IPv6 Address] Enter the IP address of the source. (5) [Security Protocol] Set the IPsec protocol to [ESP], [AH] or [ESP and AH]. If [ESP] is selected, enter only the setting items relating to ESP. If [AH] is selected, enter only the setting items relating to AH. If [ESP and AH] is selected, enter all setting items. (6) [Security Gateway IPv4 Address], [Security Gateway IPv6 Address] If [IPsec Mode] is set to [Tunnel Mode] in (2), set the IP address of the security gateway. (7) [Destination Subnet Mask Length] (IPv4), [Destination Prefix Length] (IPv6) This setting is required only if [IPsec Mode] is set to [Tunnel Mode] in (2). If IPv6 is used, enter a desired prefix length for the connection destination in the range of 16 to 128. If IPv4 is used, enter a desired length in the range of 1 to 32. zIf [Security Protocol] is set to [ESP] or [ESP and AH] in (5), (8) [SA ESP Encryption Algorithm] to (15) [SA ESP SPI (inbound)] must be set. (8) [SA ESP Encryption Algorithm] Set the ESP encryption algorithm to [AES], [3DES], [DES] or [NULL] according to the encryption algorithm supported by the device to connect to. Normally [AES] or [3DES] is recommended. (9) [SA ESP Authentication Algorithm] Set the ESP authentication algorithm to [HMAC_SHA1_96], [HMAC_MD5_96] or [No Authentication] according to the authentication algorithm supported by the device to connect to. If [ESP] is used alone, [No Authentication] cannot be selected. (10)[SA ESP Encryption Key (outbound)] Set the SA encryption key for outbound. If [AES], [3DES] or [DES] was selected in (8), set a 128-bit, 192-bit or 64-bit hexadecimal, respectively. This item need not be set if [NULL] was selected. (11)[SA ESP Authentication Key (outbound)] Set the SA authentication key for outbound. If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected in (9), set a 160-bit or 128-bit hexadecimal, respectively. This item need not be set if [No Authentication] was selected. (12)[SA ESP SPI (outbound)] Set the SA SPI value for outbound. Set a desired value in the range of 256 to 4294967295. (13)[SA ESP Encryption Key (inbound)] Set the SA encryption key for inbound. If [AES], [3DES] or [DES] was selected in (8), set a 128-bit, 192-bit or 64-bit hexadecimal, respectively. This item need not be set if [NULL] was selected. (14)[SA ESP Authentication Key (inbound)] Set the SA authentication key for inbound. If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected in (9), set a 160-bit or 128-bit hexadecimal, respectively. This item need not be set if [No Authentication] was selected. (15)[SA ESP SPI (inbound)] Set the SA SPI value for inbound. Set a desired value in the range of 256 to 4294967295. Since this setting is used as an ID for Important If the camera is rebooted during auto key exchange communication, a connection error may result after rebooting. In this case, connect again.
68 identifying the SA, be careful not to specify an inbound SPI whose value is already used in the SPI for other ESP. zIf [Security Protocol] was set to [AH] or [ESP and AH] in (5), (16) [SA AH Authentication Algorithm] to (20) [SA AH SPI (inbound)] must be set. (16)[SA AH Authentication Algorithm] Set the AH authentication algorithm to [HMAC_SHA1_96] or [HMAC_MD5_96] according to the authentication algorithm supported by the device to connect to. (17)[SA AH Authentication Key (outbound)] Set the SA authentication key for outbound. If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected in (16), set a 160-bit or 128-bit hexadecimal, respectively. (18)[SA AH SPI (outbound)] Set the SA SPI value for outbound. Set a desired value in the range of 256 to 4294967295. (19)[SA AH Authentication Key (inbound)] Set the SA authentication key for inbound. If [HMAC_SHA1_96] or [HMAC_MD5_96] was selected in (16), set a 160-bit or 128-bit hexadecimal, respectively. (20)[SA AH SPI (inbound)] Set the SA SPI value for inbound. Set a desired value in the range of 256 to 4294967295. Since this setting is used as an ID for identifying the SA, be careful not to specify an inbound SPI whose value is already used in the SPI for another AH. Note If IPsec is used, video transmission performance drops. Important To run this camera with IPsec, the communicating devices and network must be set beforehand. Contact your System Administrator for these settings. When connecting with IPsec, set the camera IP address manually. For IPv4 addresses, use addresses set with [Network] > [IPv4 Address Setting Method] > [Manual]. For IPv6 addresses, use addresses set with [Network] > [IPv6 Address (Manual)]. If any setting is changed from the [IPsec] menu, the camera may become inaccessible from the active web browser. Check beforehand the precautions in “Important” in “[Reboot Item] Setting Items Requiring Rebooting” (p. 76).
69 3 Setting Page Certificates (1) [Create Self-Signed Certificate] After entering each of the following settings, click [Exec] to create a self-signed certificate. Follow the instructions in the message and reboot. The certificate created will take effect after rebooting. Note Creating a certificate takes time, so it is recommended that you stop video transmission and upload processes. (2) [Certificate Status] If no certificate is installed, [Not Installed] will appear. If a certificate is installed, the validity period for the certificate will appear. (3) [Country (C)] Enter the country code. (4) [State/Province (ST)], [Locality (L)], [Organization (O)], [Organizational Unit (OU)], [Common Name (CN)] Enter state/province name, locality, organization name, organizational unit and common name in ASCII characters (spaces or printable characters). Enter a FQDN format host name, etc. to set the common name (required). (5) [Validity Period Start Date], [Validity Period End Date] Set the validity period of the certificate to be created in the range of 2001/01/01 to 2031/12/31 (required when creating a self-signed certificate). Certificate Management (1) [Generate Certificate Signing Request] Click [Exec] to create server private key and generate a certificate signing request. Once processed, the certificate signing request will appear in a separate window. Note Generating a certificate signing request takes time, so it is recommended that you stop video transmission and upload processes. (2) [Display Certificate Signing Request] Click [Exec] to view the details of the certificate signing request. (3) [Install Server Certificate] Perform this operation to install a server certificate. Click [Browse] to select the certificate file for installation, then click [Exec]. The certificate installed will take effect after rebooting. (4) [Install Intermediate Certificate] Perform this operation to install an intermediate certificate. Select the certificate file to be installed using [Browse] and click [Exec]. The installed certificate will take effect after rebooting. Note To install an intermediate certificate and a primary intermediate certificate, use a text editor or similar software to place them in the same file and install them as an intermediate certificate. (5) [Delete Certificate] Click [Exec] to delete the server certificate. However, if SSL communications are enabled, the certificate cannot be deleted. Set [HTTPS Connection Policy] to [HTTP] before deleting a certificate. The deletion will take effect after rebooting. [SSL/TLS] Setting HTTP Communication Encryption The following can be set here. Certificates Create an SSL/TLS certificate. Certificate Management Manage the SSL/TLS certificate. Encrypted Communications Set the encrypted communication.Important With regard to security, use a self-signed certificate where complete security does not need to be ensured through operation tests, etc. For system operation, it is recommended that you acquire and install a certificate issued by a CA.
70 (6) [Display Server Certificate Details] Click [Exec] to view the details of the server certificate. (7) [Display Self CA Certificate] Used for the purpose of testing SSL communications, but otherwise not normally used. (8) [Backup] Click [Exec] to perform a backup of the certificates and private key. This operation can only be performed when [HTTPS Connection Policy] is set to use [HTTPS] or [HTTP and HTTPS], and SSL communications are in use. (9) [Restore] Installs the certificates and private key from backup. Click [Browse] to select the backup file, then click [Exec]. This operation can only be performed when [HTTPS Connection Policy] is set to use [HTTPS] or [HTTP and HTTPS], and SSL communications are in use. The restored certificate will take effect after rebooting. Encrypted Communications (1) [HTTPS Connection Policy] Select whether or not to use SSL communications with HTTPS connections. To not use SSL communications, select [HTTP]. To use SSL communications, select [HTTPS] or [HTTP and HTTPS]. SSL connections will be possible after rebooting. When [HTTPS] is selected, even HTTP connections will be redirected to HTTPS and SSL communications will be used. Note It may take a few minutes to generate an SSL key. Depending on the type of the certificate being installed on the camera, a dialog box may appear indicating that the web browser has accepted the certificate and a connection can be made. If the dialog box does not appear, register the CA certificate in the web browser. Important Even if SSL communications are set here to be used, they will not be used if the certificate is not installed. Video transmission performance will drop, if SSL communications are used. When [HTTPS] is selected, communication with RM is not possible.