Home > Canon > Camera > Canon network camera VBH651V User Manual

Canon network camera VBH651V User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon network camera VBH651V User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Setting Page
    5
    191
    [Sound Clip]
    Select the sound clip when [Audio Playback at ON Event] or [Audio Playback at OFF Event] has been set to [Enable].
    You must register the sound  clip with [Video and Audio] > [Audio] (P. 143) beforehand.
    [Volume]
    Enter the volume fo r the sound clip.
    Linked Event Operation Examples
    This shows linked event status examples according  to the ON/OFF combinations for Event 1 and Event 2.
    In the examples below, [Event Gap]  is four seconds and each cell in the graphs below represents one second.
    [Event Linking Method] Set to [OR]
    Only One Event ON
    Both Events ON
    [Event Linking Method] is Set to  [AND], [Event Order] is Specified
    This shows examples when [Event  Order] is set to [Event 1 -> 2].
    When [Event Order] is set to [None] and [Event Linking Meth od] is set to [AND], linked events will be as in the 
    examples, even if Event 1 and Event 2 are switched.
    When Events Occur in Order 1 -> 2
    When Events Occur in Order 2-> 1 -> 2
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    Both events are ON, but their order of occurrence is 
    incorrect. Therefore, a linked event does not occur here. 
    						
    							192
    Event 2 Triggered but Event Gap Setting ([4] sec.) Exceeded
    [Status] of Event 1 Set to [OFF], ON States Do Not Coincide
    One Event Switches Between ON/OFF
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    The gap between the occurrence of event 2 after the 
    occurrence of event 1 exceeds the value specified for the 
    [Event Gap] setting. Therefore, a linked event does not occur.
    Event Gap (4 Sec. in This Example)
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    The linked event does not occur when event 1 
    turns OFF, but at the moment event 2 turns ON.
    Event Gap (4 Sec. in This Example)
    ON
    Event 1
    Event 2
    Consolidated State OFF
    ON
    OFF
    ON
    OFF
    Event Gap (4 Sec. in This Example) 
    						
    							Setting Page
    5
    193
    Separate access control from IPv4 and IPv6 addresses can be set.
    Note
    If the same address is duplicated, the address policy that is displayed  highest on the list will be applied.
    IPv4 Host Access Restrictions
    Specify the hosts from which IPv4 access is permitted and prohibited.
    [Apply Host Access Restrictions]
    Select whether to use IPv4 host access restrictions.
    [Default Policy]
    Select whether to allow or block access from IPv4 addresses  that have not been specified in [Network Address / Subnet].
    [Network Address / Subnet]
    Enter IPv4 addresses into the list and select [Yes] or [No] for access for each address.
    You can specify the subnet to set acce ss restrictions by network or host.
    If set to [No], access to all ports is blocked.
    [Security] > [Host Access Restrictions]
    Setting Access Restrictions
    Important
     To prohibit access via a proxy serv er in HTTP connection, a proxy server address must be set.
     If host access restriction is set mistakenly,  access to the Setting Pages themselves may be prohibited, in which case restoring the 
    factory default settings will b ecome the only means of recovery.
    The following settings can be configured here.
     IPv4 Host Access Restrictions IPv4
     IPv4 Host Access Restrictions IPv6 
    						
    							194
    IPv6 Host Access Restrictions
    Specify the hosts from which IPv6 access is permitted and prohibited.
    [Apply Host Access Restrictions]
    Select whether to use IPv6 host access restrictions.
    [Default Policy]
    Select whether to allow or block access from IPv6 addresses  that have not been specified in [Prefix / Prefix Length].
    [Prefix / Prefix Length]
    Enter IPv6 addresses (prefixes) into the list an d select [Yes] or [No] for access for each address.
    You can specify the prefix length to se t access restriction by network or host.
    If set to [No], access to all ports is blocked. 
    						
    							Setting Page
    5
    195
    Certificate creation and management, and encrypted communication settings.
    Certificates
    Create an SSL/TLS certificate.
    [Create Self-Signed Certificate]
    Enter the following items, click [Apply], and click [Exec] to create a self-signed certificate.
    Follow the displayed message and reboot. The certificate created will take effect after rebooting.
    Note
    Creating a certificate takes time, so it is recommended  that you stop video transmission and upload processes.
    [Certificate Status]
    If no certificate is installed, [Not Installed] will be displayed. If a certificate  is installed, the validity period for the c ertificate 
    will be displayed.
    [Country (C)]
    Enter the ISO3166-1 alpha-2 country code.
    [State/Province (ST)], [Locality (L )], [Organization (O)], [Organizational Unit (OU)], [Common Name (CN)]
    Enter state/province name, locality, organization name, or ganizational unit and common name in alphanumeric characters 
    (spaces or printable characters).
    Enter an FQDN format host name, etc. to set the common name (required).
    [Validity Period Start Date], [Validity Period End Date]
    Set the validity period of the certificate to be crea ted (required when creating a self-signed certificate).
    [Security] > [SSL/TLS]
    Setting HTTP Communication Encryption
    Important
    Use a self-signed certificate when complete security does not need  to be ensured, such as through operation tests. For system 
    operation, it is recommended that you acquire  and install a certificate issued by a CA.
    The following settings can be configured here.
     Certificates
     Certificate Management
     Encrypted Communications 
    						
    							196
    Certificate Management
    Manage the SSL/TLS certificate.
    [Generate Certificate Signing Request]
    Click [Exec] to create a server private key and generate a certificate signing request.
    Once processed, the certificate signing request will be displayed in a separate window.
    Note
    Generating a certificate signing request takes time, so it is recommended that y ou stop video transmission and upload processes .
    [Display Certificate Signing Request]
    Click [Exec] to view the details of the certificate signing request.
    [Install Server Certificate]
    Perform this operation to in stall a server certificate.
    Specify the certificate file to be inst alled using [Browse] and click [Exec].
    The certificate installed will take effect after rebooting.
    [Install Intermediate Certificate]
    Perform this operation to inst all an intermediate certificate.
    Specify the certificate file to be inst alled using [Browse] and click [Exec].
    The certificate installed will take effect after rebooting.
    Note
    To install an intermediate certificate and a cr oss root certificate, use a text editor or similar software to place them in the same file and 
    install them as an intermediate certificate.
    [Delete Server Certificate]
    Click [Exec] to delete the server certificate.
    However, if SSL/TLS communications are  enabled, the certificate cannot be deleted. Set [HTTPS Connection Policy] to 
    [HTTP] before deleting a certificate.
    The deletion will take effect after rebooting.
    [Delete Intermediate Certificate]
    Click [Exec] to delete the in termediate certificate along with the cross root certificate.
    However, if SSL/TLS communications are  enabled, the certificate cannot be deleted. Set [HTTPS Connection Policy] to 
    [HTTP] before deleting a certificate.
    The deletion will take effect after rebooting.
    [Display Server Certificate Details]
    Click [Exec] to view the details of the server certificate.
    [Display Self CA Certificate]
    Used for the purpose of testing SSL/TLS co mmunications, but otherwise not normally used.
    [Backup]
    Click [Exec] to perform a backup of the certificates and pr ivate key. This can only be performed when [HTTPS] or [HTTP 
    and HTTPS] is set for [HTTPS Connection  Policy] to perform SSL/TLS communication.
    [Restore]
    Installs the certificates and private key from backup.
    Click [Browse] to specify the backup file, then click [Exec].  This can only be performed when [HTTPS] or [HTTP and HTTPS] 
    is set for [HTTPS Connection Policy] to perform SSL/TLS communication.
    The restored certificate will take effect after rebooting.
    Encrypted Communications
    Set encrypted communications.
    [HTTPS Connection Policy]
    Set SSL/TLS communication with HTTPS connections.
    Select [HTTP] if you do not want to perform SSL/TLS communication.
    Select [HTTPS] or [HTTP and HTTPS] if you want to pe rform SSL/TLS communication. Connections using SSL/TLS are 
    enabled after restarting. 
    						
    							Setting Page
    5
    197
    If you select [HTTPS], HTTP access is also redirected to HTTPS to perform SSL/TLS communication.
    Note
     It may take a few minutes to generate an SSL/TLS key.
     Depending on the type of the certificate being installed on the  camera, a dialog box may be displayed indicating that the web browser 
    has accepted the certificate and a connection can be made. If the dialog  box is not displayed, register the CA certificate in the web 
    browser.
    Important
     Even if you set SSL/TLS communication here, SSL/TLS communi cation is not performed unless you install a certificate.
     Video distribution performance  decreases when performing SSL/TLS communicati on. If you set [HTTPS], you cannot connect with the 
    RM. 
    						
    							198
    Settings for 802.1X authentication and authentication status display, and for certificate administration.
    802.1X Authentication
    Display the 802.1X authentication enable/disable control and status.
    [802.1X Authentication]
    Select this to enable or  disable 802.1X authentication.
    [Authentication Status]
    Display the status of 802.1X aut hentication. There are three types of status: [Authenticated],  [Unauthenticated], and [Stop].
    Authentication Method
    Set the authentication method us ed for 802.1X authentication.
    [Authentication Method]
    Select [EAP-MD5], [EAP-TLS], [EAP-TTLS], or [EAP-PEAP] as  the authentication method to use for 802.1X authentication.
    [User Name]
    Enter the user name used for authentication.
    [Password]
    Enter the required pass word for authentication.
    This is displayed only when [Authentication Method ] is set to [EAP-MD5], [EAP-TTLS], or [EAP-PEAP].
    Certificate Information
    This is displayed only when [Authentication Method]  is set to [EAP-TLS], [EAP-TTLS], or [EAP-PEAP].
    [CA Certificate Status]
    If no CA certificate is installed, [Not Installed] is displayed.  If a CA certificate is installed, the validity period of the 
    certificate is displayed.
    [Client Certificate Status]
    If no client certificate is installed, [Not  Installed] is displayed. If a client certificate is inst alled, the validity period of the 
    certificate is displayed.
    This is displayed only when [Authent ication Method] is set to [EAP-TLS].
    [Security] > [802.1X]
    Network Port Authentication Settings
    The following settings can be configured here.
     802.1X Authentication
     Authentication Method
     Certificate Information
     Certificate Management 
    						
    							Setting Page
    5
    199
    [Client Private Key Status]
    If no client private key is installed, [Not Installed] is displayed. If a client private key is installed, [Installed] is 
    displayed.
    This is displayed only when [Authent ication Method] is set to [EAP-TLS].
    Certificate Management
    This is displayed only when [Authentication Method]  is set to [EAP-TLS], [EAP-TTLS], or [EAP-PEAP].
    [Install CA Certificate]
    Installs a CA certificate.
    Specify the certificate file to be inst alled using [Browse] and click [Exec].
    [Install Client Certificate]
    Installs a client certificate.
    Specify the certificate file to be inst alled using [Browse] and click [Exec].
    This is displayed only when [Authent ication Method] is set to [EAP-TLS].
    [Install Client Private Key]
    Installs a client private key.
    Specify the private key file  to be installed using [Browse] and click [Exec].
    This is displayed only when [Authent ication Method] is set to [EAP-TLS].
    [Client Private Key Password]
    Enter the password for the client private key.
    Required when a password has been configured for the private key.
    This is displayed only when [Authent ication Method] is set to [EAP-TLS].
    [Delete Certificate]
    Deletes all installed CA certificates, clie nt certificates, and client private keys.
    Only “CA Certificate” is displayed when [Authentication  Method] is set to [EAP-TTLS] or [EAP-PEAP], but any 
    installed client certificates and c lient private keys are also deleted.
    Important
     If any CA certificates, client certificates , and client private keys already exist when installing certificates, they are discarded and 
    new versions are installed.
     An error occurs if the format of the certificate  or private key to be installed is incorrect.
     Client certificates and client private ke ys are checked as a pair when installing,  and an error occurs if they do not match.
     The certificate and private key used for 802.1X authentication must  be installed as separate items, irrespective of the installation 
    status of certificates for SSL/TLS. 
    						
    							200
    Settings for using IPsec.
    Note
    If IPsec is used, video transmission performance drops.
    IPsec
    [IPsec]
    Select the key exchange method when using IPsec.
    Auto Key Exchange Settings
    [IPsec SA Encryption Algorithm]
    Select the IPsec SA encryption algorithm.
    The specified algorithm will be checked for an app licable encryption algorithm starting from the left.
    [IPsec SA Authentication Algorithm]
    Select the IPsec SA authentication algorithm.
    [Security] > [IPsec]
    Setting IPsec
    Important
     To run this camera with IPsec, the communicating devices and netwo rk must be set beforehand. Contact your system administrator for 
    these settings.
     When connecting with IPsec, set the camera IP address manually. For IPv4 addresses, use addresses with  [IPv4 Address Setting Method] set to [Manual] in [Basic] > [Network] > [IPv4].
    For IPv6 addresses, use addresses set with [IPv6 Address (Manual)] in [Basic] > [Network] > [IPv6].
     If the IPsec setting is changed and the camera may become ina ccessible from the active web browser, a confirmation dialog box will 
    be displayed. Click [OK] to apply the new settings.
    If you restart the camera and cannot connect to the camera from the web browser, any available URI for connecting to the camera  will 
    be displayed in a message.
    If you cannot connect to the camera through the displayed URI, contact your system administrator.
    The following settings can be configured here.
    
     Auto Key Exchange Settings
     IPsec Set 1 to 5 
    						
    All Canon manuals Comments (0)

    Related Manuals for Canon network camera VBH651V User Manual