ilt=0\&zoom=0\&priority=100\&token=63062383-054e-4406-baee-71b27888d65e^LVEAMPZOTD^50^0^0^1676908488^01dbf56e971127eeaa536b94
efe62466ba67b74d
* About to connect() to 192.168.1.197 port 443 (#0)
* Trying 192.168.1.197...
* Adding handle: conn: 0x768c8
* Adding handle: send: 0
* Adding handle: recv: 0
* Curl_addHandleToPipeline: length: 1
* - Conn 0 (0x768c8) send_pipe: 1, recv_pipe: 0
* Connected to 192.168.1.197 (192.168.1.197) port 443 (#0)
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
* SSLv3, TLS Unknown, Unknown (22):
* SSLv3, TLS handshake, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Server hello (2):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, CERT (11):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Server finished (14):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv2, Unknown (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Finished (20):
* SSLv2, Unknown (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using AES256-SHA
* Server certificate:
* subject: CN=localhost.localdomain
* start date: 2015-04-08 12:48:01 GMT
* expire date: 2017-04-07 12:48:01 GMT
* issuer: CN=localhost.localdomain
* SSL certificate verify result: self signed certificate (18), continuing anyway.
* SSLv2, Unknown (23):
* SSLv2, Unknown (23):
> GET /ums/ManagedDevices/CameraControls/63062383-054e-4406-baee-71b27888d65e/doPTZ?pan=1000&tilt=0&zoom=0&priority=100&token=63062383-054e-4406-baee-71b27888d65e^LVEAMPZOTD^50^0^0^1676908488^01dbf56e971127eeaa536b94efe62466ba67b74d HTTP/1.1
> User-Agent: curl/7.30.0
> Host: 192.168.1.197
> Accept: */*
>
* SSLv2, Unknown (23):
* SSLv2, Unknown (23):
< HTTP/1.1 200 OK
< Date: Tuesday, 23-Feb-16 10:38:29 GMT
* Server Cisco VSMS-Server is not blacklisted
< Server: Cisco VSMS-Server
< Expires: Tuesday, 23-Feb-16 10:38:29 GMT
< Pragma: no-cache
< Content-Type: application/xml
< Content-Length: 275
<
<?xml version="1.0" encoding="UTF-8"?>
<ResponseStatus>
<requestURL></requestURL>
<statusCode>0</statusCode>
<statusString>Camera control request succeeded</statusString>
<minorCode>2</minorCode>
<minorStatusString>Updated</minorStatusString>
* Connection #0 to host 192.168.1.197 left intact
</ResponseStatus>~ #
ilt=0\&zoom=0\&priority=100\&token=63062383-054e-4406-baee-71b27888d65e^LVEAMPZOTD^50^0^0^1676908488^01dbf56e971127eeaa536b94
efe62466ba67b74d
* About to connect() to 192.168.1.197 port 443 (#0)
* Trying 192.168.1.197...
* Adding handle: conn: 0x768c8
* Adding handle: send: 0
* Adding handle: recv: 0
* Curl_addHandleToPipeline: length: 1
* - Conn 0 (0x768c8) send_pipe: 1, recv_pipe: 0
* Connected to 192.168.1.197 (192.168.1.197) port 443 (#0)
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
* SSLv3, TLS Unknown, Unknown (22):
* SSLv3, TLS handshake, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Server hello (2):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, CERT (11):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Server finished (14):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv2, Unknown (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Finished (20):
* SSLv2, Unknown (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv2, Unknown (22):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using AES256-SHA
* Server certificate:
* subject: CN=localhost.localdomain
* start date: 2015-04-08 12:48:01 GMT
* expire date: 2017-04-07 12:48:01 GMT
* issuer: CN=localhost.localdomain
* SSL certificate verify result: self signed certificate (18), continuing anyway.
* SSLv2, Unknown (23):
* SSLv2, Unknown (23):
> GET /ums/ManagedDevices/CameraControls/63062383-054e-4406-baee-71b27888d65e/doPTZ?pan=1000&tilt=0&zoom=0&priority=100&token=63062383-054e-4406-baee-71b27888d65e^LVEAMPZOTD^50^0^0^1676908488^01dbf56e971127eeaa536b94efe62466ba67b74d HTTP/1.1
> User-Agent: curl/7.30.0
> Host: 192.168.1.197
> Accept: */*
>
* SSLv2, Unknown (23):
* SSLv2, Unknown (23):
< HTTP/1.1 400 Bad Request
< Date: Tuesday, 23-Feb-16 10:40:41 GMT
* Server Cisco VSMS-Server is not blacklisted
< Server: Cisco VSMS-Server
< Expires: Tuesday, 23-Feb-16 10:40:41 GMT
< Pragma: no-cache
< Content-Type: application/xml
< Content-Length: 382
<
<?xml version="1.0" encoding="UTF-8"?>
<ResponseStatus>
<requestURL></requestURL>
<statusCode>3</statusCode>
<statusString>Camera controls for device '63062383-054e-4406-baee-71b27888d65e' failed [Serial passthrough failed for port:0 chainNo:1 - ].</statusString>
<minorCode>6</minorCode>
<minorStatusString>Bad Request</minorStatusString>
* Connection #0 to host 192.168.1.197 left intact
</ResponseStatus>~ #