Help connecting to camera on other LAN
-
Camera: AXIS P3364
NVR: Blue Iris Win10
Alexa: Echo Show 5Hello,
I have an echo show 5 connected to a LAN with a 192 IP address. My Blue Iris NVR is on a different LAN with a 77 IP address connected to the camera via Ethernet. The NVR touches my home network (192) through a WiFi adapter, hence is is on both the 77 and the 192 networks). I sign on to the NVR bus remote desktop connection. I can ping both the 77 and 192 networks (including the camera) from either machine.
I am running the monicle gateway, and am tagged @tunnel. I have also tried @proxy. The Monocle skill is enabled on Alexa and it has been discovered. However Alexa won’t pick up the camera feed.
Any suggestions?
-
OK, if you can, please provide a copy of the log output from your Monocle Gateway from startup to the point you ask for a camera feed.
As long as your router can resolve the camera addresses, it should work. For tags, make sure to use either
@tunnel
or@proxy-tcp
. These make make sure to use only TCP for communication with your cameras or NVR.@proxy
will attempt to use UDP for the stream and that may fail in a situation where there are multiple VLANs.Thanks, Robert
-
Hello, Robert- Please see the log cut/paste below. I did try @tunnel and @proxy-tcp and neither worked. Still getting “Hmmm, camera not found”. I also tried some other tags I saw in the forum such as @noaudio, @ntpnow, and @fakentp. The rtsp address did work in VLC for me on the NVP server (77), but not on the LAN (192) where gateway is running. As I mentioned, I can ping back and forth though, and can ping the camera from the LAN PC.
------------------------------------------------- MONOCLE RUNTIME ENVIRONMENT ------------------------------------------------- VERSION = 0.0.4 OS/ARCH = win32\x64 PROCESS = monocle-gateway (PID=33212) TIMESTAMP = 2019-09-14T08:44:41.337Z ------------------------------------------------- MONOCLE GATEWAY SERVICE (Version: 0.0.4) ------------------------------------------------- [Monocle Starting] [Monocle Connecting] [Monocle Started] [RTSP Server Starting] [RTSP Server Listening] 0.0.0.0:8555 (RTSP) [RTSP Server Listening] 0.0.0.0:443 (RTSP-TLS) [RTSP Proxy Started] (PID=4724) [RTSP Server Listening] 0.0.0.0:8554 (PROXY) [RTSP Server Started] [Monocle Connected] [RTSP Server Registered] ------------------------------------------------- MONOCLE RTSP SERVICE - INITIALIZED ------------------------------------------------- FQDN = e6cd8c21-da3a-43d8-893b-f1ae390228ed.mproxy.io HOST = 192.168.1.23 PORT = 443 ------------------------------------------------- ------------------------------------------------- INITIALIZE RTSP STREAM: 1236 ------------------------------------------------- - NAME : 1236 - LABEL : PRIMARY - URL : rtsp://77.1.1.2:554/axis-media/media.amp - UUID : STREAM:39933ad5-0783-4e50-b05d-15445111d263 - SESS : 3834404b-92d2-4d53-b72e-d89d600d9d4c - MODIF : Sat Sep 14 2019 01:38:19 GMT-0700 (Pacific Daylight Time) - TAGS : @tunnel ------------------------------------------------- 2019-09-14T08:45:36.784Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP CLIENT SOCKET CONNECTED 2019-09-14T08:45:36.910Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP CLIENT ATTACHED TO STREAM: 1236 (STREAM:39933ad5-0783-4e50-b05d-15445111d263) 2019-09-14T08:45:36.923Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP ENDPOINT SOCKET CONNECTED {77.1.1.2:554} 2019-09-14T08:45:36.925Z [DEBUG] [192.168.1.41:35444 <rkK3_mqIB>] [CLIENT REQUEST] --> [DESCRIBE] rtsp://e6cd8c21-da3a-43d8-893b-f1ae390228ed.mproxy.io:443/STREAM:39933ad5-0783-4e50-b05d-15445111d263?session=3834404b-92d2-4d53-b72e-d89d600d9d4c 2019-09-14T08:45:36.925Z [TRACE] [192.168.1.41:35444 <rkK3_mqIB>] [CLIENT REQUEST] --> [HEADERS] { "accept": "application/sdp", "user-agent": "Fire OS/6.0 stagefright/1.2 (Linux;Android 7.1.2)", "cseq": "1" } 2019-09-14T08:45:36.926Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP ENDPOINT ATTEMPTING AUTHENTICATION: BASIC 2019-09-14T08:45:36.927Z [DEBUG] [192.168.1.41:35444 <rkK3_mqIB>] [ENDPOINT REQUEST] --> [DESCRIBE] rtsp://77.1.1.2:554/axis-media/media.amp 2019-09-14T08:45:36.927Z [TRACE] [192.168.1.41:35444 <rkK3_mqIB>] [ENDPOINT REQUEST] --> [HEADERS] { "accept": "application/sdp", "user-agent": "Fire OS/6.0 stagefright/1.2 (Linux;Android 7.1.2)", "cseq": "1", "authorization": "Basic YWRtaW46YWRtaW4=" } 2019-09-14T08:45:37.124Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP ENDPOINT SOCKET CLOSED [192.168.1.41:35444 <rkK3_mqIB>] 2019-09-14T08:46:06.912Z [WARN] [192.168.1.41:35444 <rkK3_mqIB>] RTSP CLIENT SOCKET TIMEOUT 2019-09-14T08:46:06.923Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP CLIENT SOCKET CLOSED 2019-09-14T08:46:06.924Z [INFO] [192.168.1.41:35444 <rkK3_mqIB>] RTSP CLIENT DETACHED FROM STREAM: 1236 (STREAM:39933ad5-0783-4e50-b05d-15445111d263) ------------------------------------------------- INITIALIZE RTSP STREAM: 1236 ------------------------------------------------- - NAME : 1236 - LABEL : PRIMARY - URL : rtsp://77.1.1.2:554/axis-media/media.amp - UUID : STREAM:39933ad5-0783-4e50-b05d-15445111d263 - SESS : a66f766f-4779-4ac8-918d-ea367d95d53d - MODIF : Sat Sep 14 2019 01:38:19 GMT-0700 (Pacific Daylight Time) - TAGS : @tunnel ------------------------------------------------- 2019-09-14T08:46:07.887Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP CLIENT SOCKET CONNECTED 2019-09-14T08:46:08.024Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP CLIENT ATTACHED TO STREAM: 1236 (STREAM:39933ad5-0783-4e50-b05d-15445111d263) 2019-09-14T08:46:08.035Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP ENDPOINT SOCKET CONNECTED {77.1.1.2:554} 2019-09-14T08:46:08.035Z [DEBUG] [192.168.1.41:35456 <S1uROm98S>] [CLIENT REQUEST] --> [DESCRIBE] rtsp://e6cd8c21-da3a-43d8-893b-f1ae390228ed.mproxy.io:443/STREAM:39933ad5-0783-4e50-b05d-15445111d263?session=a66f766f-4779-4ac8-918d-ea367d95d53d 2019-09-14T08:46:08.036Z [TRACE] [192.168.1.41:35456 <S1uROm98S>] [CLIENT REQUEST] --> [HEADERS] { "accept": "application/sdp", "user-agent": "Fire OS/6.0 stagefright/1.2 (Linux;Android 7.1.2)", "cseq": "1" } 2019-09-14T08:46:08.037Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP ENDPOINT ATTEMPTING AUTHENTICATION: BASIC 2019-09-14T08:46:08.038Z [DEBUG] [192.168.1.41:35456 <S1uROm98S>] [ENDPOINT REQUEST] --> [DESCRIBE] rtsp://77.1.1.2:554/axis-media/media.amp 2019-09-14T08:46:08.038Z [TRACE] [192.168.1.41:35456 <S1uROm98S>] [ENDPOINT REQUEST] --> [HEADERS] { "accept": "application/sdp", "user-agent": "Fire OS/6.0 stagefright/1.2 (Linux;Android 7.1.2)", "cseq": "1", "authorization": "Basic YWRtaW46YWRtaW4=" } 2019-09-14T08:46:08.239Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP ENDPOINT SOCKET CLOSED [192.168.1.41:35456 <S1uROm98S>] 2019-09-14T08:46:38.025Z [WARN] [192.168.1.41:35456 <S1uROm98S>] RTSP CLIENT SOCKET TIMEOUT 2019-09-14T08:46:38.035Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP CLIENT SOCKET CLOSED 2019-09-14T08:46:38.036Z [INFO] [192.168.1.41:35456 <S1uROm98S>] RTSP CLIENT DETACHED FROM STREAM: 1236 (STREAM:39933ad5-0783-4e50-b05d-15445111d263) ------------------------------------------------- INITIALIZE RTSP STREAM: 1236 ------------------------------------------------- - NAME : 1236 - LABEL : PRIMARY - URL : rtsp://77.1.1.2:554/axis-media/media.amp - UUID : STREAM:39933ad5-0783-4e50-b05d-15445111d263 - SESS : a80934bb-8f4e-40a4-b3a6-f2f9dfc13093 - MODIF : Sat Sep 14 2019 01:38:19 GMT-0700 (Pacific Daylight Time) - TAGS : @tunnel ------------------------------------------------- 2019-09-14T08:46:38.933Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP CLIENT SOCKET CONNECTED 2019-09-14T08:46:39.061Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP CLIENT ATTACHED TO STREAM: 1236 (STREAM:39933ad5-0783-4e50-b05d-15445111d263) 2019-09-14T08:46:39.065Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP ENDPOINT SOCKET CONNECTED {77.1.1.2:554} 2019-09-14T08:46:39.066Z [DEBUG] [192.168.1.41:35458 <ryweYm5IB>] [CLIENT REQUEST] --> [DESCRIBE] rtsp://e6cd8c21-da3a-43d8-893b-f1ae390228ed.mproxy.io:443/STREAM:39933ad5-0783-4e50-b05d-15445111d263?session=a80934bb-8f4e-40a4-b3a6-f2f9dfc13093 2019-09-14T08:46:39.066Z [TRACE] [192.168.1.41:35458 <ryweYm5IB>] [CLIENT REQUEST] --> [HEADERS] { "accept": "application/sdp", "user-agent": "Fire OS/6.0 stagefright/1.2 (Linux;Android 7.1.2)", "cseq": "1" } 2019-09-14T08:46:39.066Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP ENDPOINT ATTEMPTING AUTHENTICATION: BASIC 2019-09-14T08:46:39.067Z [DEBUG] [192.168.1.41:35458 <ryweYm5IB>] [ENDPOINT REQUEST] --> [DESCRIBE] rtsp://77.1.1.2:554/axis-media/media.amp 2019-09-14T08:46:39.068Z [TRACE] [192.168.1.41:35458 <ryweYm5IB>] [ENDPOINT REQUEST] --> [HEADERS] { "accept": "application/sdp", "user-agent": "Fire OS/6.0 stagefright/1.2 (Linux;Android 7.1.2)", "cseq": "1", "authorization": "Basic YWRtaW46YWRtaW4=" } 2019-09-14T08:46:39.263Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP ENDPOINT SOCKET CLOSED [192.168.1.41:35458 <ryweYm5IB>] 2019-09-14T08:47:09.062Z [WARN] [192.168.1.41:35458 <ryweYm5IB>] RTSP CLIENT SOCKET TIMEOUT 2019-09-14T08:47:09.066Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP CLIENT SOCKET CLOSED 2019-09-14T08:47:09.067Z [INFO] [192.168.1.41:35458 <ryweYm5IB>] RTSP CLIENT DETACHED FROM STREAM: 1236 (STREAM:39933ad5-0783-4e50-b05d-15445111d263)
-
@Monocle Hello, were you able to see anything in the log suggestive of the issue?
-
Sorry for the delay, I have been away for a couple of weeks.
In all cases in the log, the gateway attempts to use BASIC authentication to access the RTSP stream on the camera and perform a DESCRIBE request. In all cases the camera immediately terminates the TCP/RTSP connection from the gateway. So there is something the camera does not like about the request. It should at least return an error code for invalid requests or invalid authentication attempts, but it’s just terminating the TCP socket with no response. Very odd.
If this is a camera stream that you can temporarily make available to me over the Internet for testing, I can perform some additional tests to see if there is any workaround. You can PM me the connection details and a temporary view-only access credentials.
Thanks, Robert