Categories
User Guides exacqVision EDGE Documentation exacqVision Server Categories Products

Edge Plus Archive Options

exacqVision Edge Plus Archiving currently supports SMB archiving targets.

Edge Plus does not currently support Cloud Drive or Amazon S3 archiving.

<br>

Categories
User Guides Documentation Categories Products

exacqVision Hardening Guide v22.12

exacqVision-Hardening-Guide-v2212-REV-B.pdf
Categories
User Guides Knowledge Support Documentation Support Illustra Categories Products exacqVision Integrations

Enhanced vs Standard Security on Illustra cameras

After logging into your Illustra camera for the first time, accepting the End User License Agreement, and creating a Host ID, you will be asked to select a security mode.

SecurityMode.png

Enhanced is selected by default. As the message indicates, Enhanced will automatically select several advanced security options, such as enabling additional authentication needs, like forcing the creation of a non-default username, and requiring HTTPS. Regardless of the selection chosen on initial setup, individual settings can always be changed later by navigating to Security Status, under the Security menu.

Selecting ‘Enhanced’ Security performs the following:

  • Requires authentication to the RTSP video stream
  • Changes Authentication from Basic to Digest
  • Disables HTTP, requiring HTTPS connections for the camera GUI and Video
  • Disables uPnP, which hides the device from device discovery.
Security settings, as automatically selected by Enhanced Mode. Individual settings may still be changed manually.

Changing any of the security settings only requires you to click the Edit link beside the listed option. Some settings offer the ability to change port numbers and some offer additional setting fields to configure. 

Notice that Onvif Discovery may be individually disabled on this page as well. Clicking the Edit link for Onvif Discovery redirects to the Remote Access options page. This permits you to disable Onvif Discovery, or require Onvif User Authentication. 

The Users configuration page permits additional user accounts to be created, in which a user role is assigned. Enabling Onvif User Authentication directs the camera to only accept commands from authenticated users. 

<br>

Categories
User Guides Cloudvue Documentation Categories Products

Cloudvue User Manual cv22.4.0.6

CV-User-Guide-22.4.0.6.pdf
Categories
User Guides Knowledge Support Support exacqVision Client exacqVision Server Categories

Create Illustra camera privacy zone

Description 

This document will outline the process of creating a privacy zone on an Illustra camera.

Expected Results 

When the camera is connected to exacqVision you will be able to create a privacy zone through the inbuilt options.

Actual Results 

The inbuilt option is greyed out/disabled for Illustra cameras.

Solution

Create the privacy zone in the web client for the camera.

Categories
User Guides Cloudvue Documentation Cloudvue Access Control Categories Products

KT-1 Cloud User Guide v1.05

KT-1-Cloud-User-Guide-v1.05-1.pdf
Categories
User Guides Cloudvue Documentation Cloudvue Access Control Categories Products

Cloudvue Mobile Access Control User Guide

Cloudvue Mobile Access Control User Guide
Cloudvue-mobile-access-user-guide_lt_en.pdf
Categories
User Guides Knowledge Support Documentation Support exacqVision Enterprise exacqVision Server Categories exacqVision Webservice Products

exacqVision Hardening Guide

Description 

A hardening guide is a supplemental document that is provided alongside installation instructions with a product.

Product 

  • exacqVision Server
  • exacqVision Web Service
  • exacqVision Enterprise Manager

Solution

A hardening guide is a supplemental document that is provided alongside installation instructions with a product. This hardening guide will outline the minimal necessary steps to ensure a secure installation of the product in a customer environment. The document can vary in terms of length and technical detail at the discretion of the Product Management team and Security Architects for that line of business.

exacqVision Hardening Guides are available from the Johnson Controls Cyber Learning and Resource Center at https://www.johnsoncontrols.com/cyber-solutions/resources#Security

<br>

Categories
User Guides Documentation Integrations exacqVision Client Categories Products exacqVision Integrations

Using the ADVCPTZKEY1 USB Joystick / Keyboard with exacqVision

This document will guide you through step-by-step procedures for keyboard use and suggested button mappings.

Prerequisites

For proper operation of the American Dynamics ADVCPTZKEY1 PTZ USB Keyboard, both the exacqVision Client and Server must be on version 22.03 or higher.

Product 

ADVCPTZKEY1 American Dynamics Surveillance Keyboard

<br>

Setup

  1. Install, or update, the exacqVision Server and Client as mentioned in Prerequisites above.<br><br>
  2. Plug the keyboard’s USB cable into the USB port on the Client viewing machine, where the keyboard will be operated from.<br><br>
  3. Navigate to the Joystick configuration page within the exacqVision Client.
    • Select the cog wheel icon in the top left-hand corner of the Client window to enter Configuration settings.
    • Expand Client from the navigation tree on the left-hand side.
    • Select Joystick from the tree to load the Joystick configuration page.<br><br>
  4. Select the joystick that appears from the drop-down menu. If the device fails to appear, close and re-open the exacqVision Client instance.
    <br><br>
  5. Select the Calibrate button to zero out the joystick positioning.<br><br>
  6. Adjust the sensitivity to your liking.
    • X/Y Axis controls camera Pan/Tilt, while Z Axis controls zoom.
    • X Position corresponds to the jog wheel on the left of the keyboard.
    • Suggested settings include increasing the sensitivity on the X/Y Axis and Z Axis, but slightly decreasing the sensitivity on the X Position.


      In the example above, the Z Axis and X Position have also had their Invert checkboxes selected to mimic the default controls of the exacqVision Surveillance Keyboard.<br><br>
  7. Pressing any of the buttons on the keyboard will highlight that number in the button menu to help you find the corresponding mapping. You may need to scroll the window if you do not see the button highlighted when pressed.
    <br><br><br><br>
    <br><br><br><br>
  8. Once you have located the button, you may use the drop-down menu to select the action you wish to assign to the button. While this can be customized to your operator’s liking, a suggested mapping for new users can be found below.
    <br><br>
  9. After applying changes to the keyboard configuration, return to the Live camera view and the controls will be available for use.

<br>

Categories
User Guides Knowledge Support Documentation Support exacqVision Webservice Products

Validating Certificate Permissions for SSL and HTTPS on Linux for WebService

In this example using Letsencrypt SSL certificates. The webservice is behind HAProxy and was not been able to successfully configure HAProxy to update Letsencrypt certificates over HTTP. Therefore, I manually updated the certificate.
/etc/webservice/tls/server.crt _> /etc/letsencrypt/live/site.com/cert.pem

/etc/webservice/tls/server.key -> /etc/letsencrypt/live/site.com/privkey.pem.

After updating the certificates, I linked the original to the new certificates in the Letencrypt folder:
When I try to connect to the webservice, I get this error message sent an invalid response. ERR_SSL_PROTOCOL_ERROR’.


The destination of his symlink, not the symlink itself, needs to be readable by the nvrweb user. In this example the directory that the symlink did not have permissions to allow the link to work correctly.

The best way to be sure would be to run terminal command
sudo -i
to root and then run
su nvrweb -s /bin/bash
and try to view the files (e.g., cat the paths listed in the config file).
This should give you an out put.

{
“service”: {
“name”: “Customer Name”,
“url”: “https://site.com”,
“loginTokenExpiration”: 30,
“discoverable”: true,
“inactivityTimeout”: 0,
“enableAutocomplete”: false,
“enableRelay”: false
},
“webserver”: {
“listen”: 80,
“tls”: {
“listen”: 443,
“cert”: “/etc/webservice/tls/server.crt”,
“key”: “/etc/webservice/tls/server.key”,
“type”: “external”
}
},
“log”: {
“duration”: 1,
“interval”: “W”,
“level”: “debug”,
“retain”: 1
},
“servers”: [
{
“host”: “site.com”,
“port”: 22609,
“passthrough”: {
“enabled”: false
},
“poweruser”: {
“enabled”: true,
“username”: “INFO”,
“password”: ” INFO”
}
}
],
“nvrg”: {
“port”: 22717,
“remote”: {
“enabled”: false,
“port”: 35111
}
},
“updates”: {
“fileInfo”: “https://www.exacq.com/downloads/evFileInfo.txt”,
“downloadTimeout”: 10
},
“auth”: {
“type”: “none”

We also need to make sure nvrweb can read the cert files
/etc/webservice/tls/server.crt and .key
The output will show the certs.

nvrweb@sunstone:/root$ cd /etc/webservice
nvrweb@sunstone:/etc/webservice$ cat tls/server.crt
—–BEGIN CERTIFICATE—–
Contents of cert will be displayed here.
—–END CERTIFICATE—–

nvrweb@sunstone:/etc/webservice$ cat tls/server.key
—–BEGIN PRIVATE KEY—–
Contents of Cert will be displayed here
—–END PRIVATE KEY—–

These certs were in the TLS directory and being linked to the Letsencrypt folder, which we found having permissions issues.

To check try the following:
Try the same thing with su to nvrweb and see if nvrweb can access the certs in the let’s encrypt folder, before changes WS config.
Important to note that it’s not just the permissions of the target file that matter, but all the directories in between. In this case the target file was fine but the directory was LetsEncrypt and that did not have permissions. Since we were pointing the link to another file, that file needs to be accessible to nvrweb.

ls -ld for each directory – /etc/letsencrypt, /etc/letsencrypt/live, /etc/letsencrypt/site.com

Without -d it will show the contents, if you want to look at the directory like /etc/letsencrypt it’s necessary to do ls -ld /etc/letsencrypt

The site.com directory is fine. We need to check the live or letsencrypt directories.
letsencrypt live directory’s permissions are rwx—- which means only root can enter or read the directory.

In the above photo we can see that the Permission is denied for the letsencrypt/live folder.

Configuration this way in not the normal process and it is possible the next time I run letsencrypt again to update certs it might error due to perms or reset them. The process might need to be done each time.