Home > Canon > Camera > Canon network camera VBM40 User Manual

Canon network camera VBM40 User Manual

Here you can view all the pages of manual Canon network camera VBM40 User Manual. The Canon manuals for Camera are available online for free. You can easily download all the documents as PDF.

Page 51

[Event] Image Buffer, Volume Detection, Audio Playback and Timer Settings
4-21
4
Setting Page
8[Upload] 
Select the upload operation to be performed. If 
[Enable] is selected, upload is performed when a 
volume detection event occurs. To use this function, 
the [General Upload] sub-menu and [HTTP Upload] or 
[FTP Upload] sub-menu must also be set from the 
[Upload] menu (P. 4-15).
9[E-mail Notification] 
Select the e-mail notification operation to be 
performed. If [Enable] is selected, e-mail...

Page 52

4-22
Timer
1[Timer Event Setting] 
Select [Enable] or [Disable] for timer event. 
2[Start Time] 
Set the start time of the timer event in 24-hour format. 
3[Repeat Setting] 
If [Enable] is selected, timer events will be generated 
according to settings in 4 [Repeat Interval], 5 
[Repeat Count]. 
4[Repeat Interval] 
Select [1 sec.] [5 sec.] [10 sec.] [30 sec.] [1 min.] [5 
min.] [10 min.] [15 min.] [20 min.] [30 min.] [1 hour] [3 
hours] [6 hours] or [12 hours] for the upload and e-mail 
notification...

Page 53

4-23
4
Setting Page
Authorized User Account
1[User Name], [Password] 
Enter the user name and password and then click 
[Add]. The authorized user will be added to the user list. 
The user name can consist of up to 15 (single-byte) 
characters using A to Z, a to z, 0 to 9, “-” (hyphen) and 
“_” (underscore). 
The password can consist of 6 to15 (single-byte) ASCII 
characters (space or printable characters). 
2[User List] 
A list of authorized users is shown. User authorities can 
be set for these users....

Page 54

4-24
Note
If the same address is duplicated, the policy for the address that 
appears highest on the list will be applied. 
IPv6 Host Access Restrictions
1[Apply Host Access Restrictions] 
Set IPv6 host access restrictions to [Disable] or 
[Enable]. 
2[Default Policy] 
If IPv6 host access restrictions are applied, select 
[Authorize Access] or [Prohibit Access] for the default 
policy. 
3[Prefix / Prefix Length] 
Create a list of permitted hosts and restricted hosts and 
set IPv6 address access for each...

Page 55

4-25
4
Setting Page
IPsec 
1[IPsec] 
Key settings for use with IPsec can be selected as 
[Auto Key Exchange] or [Manual].
Auto Key Exchange Setting
1[IPsec SA Encryption Algorithm] 
Set the IPsec SA encryption algorithm to [AES->3DES], 
[AES->3DES->DES] or [AES->3DES->DES->NULL]. 
The specified algorithm will be checked for an 
applicable encryption algorithm starting from the left. 
2[IPsec SA Authentication Algorithm] 
Set the IPsec SA authentication algorithm to 
[HMAC_SHA1_96] or...

Page 56

4-26
8[IKE Pre-Shared Key] 
Enter the pre-shared key for IKE (auto key exchange)
(up to 127 characters). 
Note
If auto key exchange is used, it will take approximately 5 to 10 
seconds before communication with the camera starts. 
IPsec Set (Manual) 
IPsec Sets 1 to 5 are available, and you can specify IPsec 
settings for one communication device for each IPsec Set. 
1[IPsec Set] 
Set IPsec Set to [Disable], [Enable in IPv4] or [Enable 
in IPv6]. 
2[IPsec Mode] 
Set IPsec mode to [Tunnel Mode] or...

Page 57

[IPsec] IPsec Settings
4-27
4
Setting Page
A
g[SA ESP SPI (inbound)] 
Set the SA SPI value for inbound. 
Set a desired value in the range of 256 to 4294967295. 
Since this setting is used as an ID for identifying the 
SA, be careful not to specify an inbound SPI whose 
value is already used in the SPI for other ESP. 
 If [Security Protocol] was set to [AH] or [ESP and AH] in 
5, A
h [SA AH Authentication Algorithm] to S
q [SA AH 
SPI (inbound)] must be set. 
A h[SA AH Authentication Algorithm] 
Set the...

Page 58

4-28
Certificates
1[Create Self-Signed Certificate] 
After entering each of the following settings, click 
[Exec] to create a self-signed certificate. Follow the 
instructions in the message and reboot. The certificate 
created will take effect after rebooting. 
Note
Creating a certificate takes time, so it is recommended that you 
stop video transmission and upload processes.
2[Certificate Status] 
If no certificate is installed, “Not Installed” will appear. If 
a certificate is installed, “Installed”...

Page 59

[SSL/TLS] HTTP Communication Encryption Settings
4-29
4
Setting Page
7[Self CA Certificate] 
Used for the purpose of testing SSL communications, 
but otherwise not normally used. 
8[Backup] 
Click [Exec] to perform a backup of the certificates and  
private key. This operation can only be performed via 
SSL communications. 
9[Restore] 
Installs the certificates and private key from backup. 
Click [Browse] to select the backup file, then click 
[Exec]. This operation can only be performed via SSL...

Page 60

4-30
SD Card Operation (unmount status) 
1[Mount/Unmount] 
In unmount status, [Mount] will appear. Click [Mount] to 
mount the SD memory card. 
Note
SD and SDHC memory cards can be used with the VB-M40. 
When an SD memory card is inserted in the card slot, it is 
mounted automatically. It is also mounted automatically if 
inserted in the camera at the time of booting. 
For inserting and removing the SD memory card, see “Using an 
SD Memory Card” in the “Installation Guide.” 
2[Operation Settings] 
Set...
Start reading Canon network camera VBM40 User Manual

Related Manuals for Canon network camera VBM40 User Manual

All Canon manuals