Canon network camera VBC500VD User Manual
Here you can view all the pages of manual Canon network camera VBC500VD User Manual. The Canon manuals for Camera are available online for free. You can easily download all the documents as PDF.
Page 51
1-37 1 1Detailed Settings Setting User Acces s Privileges (Access Control) Authorized User Account (1) [User Name], [Password] Enter the user name and password and then click [ Add]. The authorized user will be added to the user list. The user name can consist of up to eight (single-byte ) characters of A to Z, a to z, 0 to 9, - (hyphen) and _ (underber). The password can consist of up to eight (singl e-byte) ASCII characters (space or printable characters). (2) [User List] A list of authorized...
Page 52
1-38 Setting User Access Privileges (Access Control) User Authority [Privileged Camera Control], [Camera Control], [Image Distribution], [Audio Distribution] Set the user privileges of authorized user s and guest users. Select the check boxes corresponding to the items you want to permit for each user. Host Access Restriction (1) [Host List] A list of hosts from which access is permitted and restricted is shown. (2) [Apply the list to HTTP Server] If [Ye s ] is selected, the host list is applied...
Page 53
1-39 Setting User Access Privileges (Access Control) 1 1Detailed Settings Note z If no host list is available, acces s is permitted to all hosts. z If a host list is given that indi cates prohibition of all accesses, the host restriction function is disabled and access is permitted to all hosts. z To prohibit access via a proxy server in HTTP connection, a proxy server address must be set. z If Host Access Restriction is set wrongly, access to the setting pages itself may be prohibited, in which...
Page 54
1-40 Setting User Access Privileges (Access Control) Example of description Example 1. Prohibit access from a given access !172.20.0.10 Access from the host whose address is 172.20.0.10 is prohibited. Example 2. Prohibit access from hosts in a given range !172.20.0.0-172.20.0.20 Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is prohibited. Example 3. Permit access from hosts in a gi ven range and prohibit access from all other hosts 172.20.0.10-172.20.0.12...
Page 55
1-41 1 1Detailed Settings IPsec Settings (IPsec) IPsec Set IPsec Sets 1 to 5 are available, where IP sec settings for each communication using each IPsec Set. (1) [IPsec] Select [ Manual] if IPsec will be used. Select [ Disable] if IPsec will not be used. (2) [IPsec Mode] Select [ Tunnel Mode ] or [Transport Mode ] as the IPsec operation mode. (3) [Destination Address (IPv4/IPv6)] Enter the IP address of the connection destination. (4) [Source Address (IPv4/IPv6)] Enter the IP address of the sender....
Page 56
1-42 IPsec Settings (IPsec) „If [ ESP] or [ ESP and AH ] was set under [ Security Protocol ] in (5), the following items must be set. (8) [SA ESP Encryption Algorithm] Select [ AES], [3DES], [DES ] or [ NULL] as the ESP encryption algorithm according to the encryption algorithm supported by the device to connect to. Normally [ AES] or [ 3DES] is recommended. (9) [SA ESP Authentication Algorithm] Select [ HMAC_SHA1_96], [HMAC_MD5_96] or [ No Authentication]as the ESP authentication algorithm according...
Page 57
1-43 IPsec Settings (IPsec) 1 1Detailed Settings (14)[SA ESP Authentication key (inbound)] Set the SA authentication key for inbound. If [ HMAC_SHA1_96] or [HMAC_MD5_96] was set in (9), set a 160-bit or 128-bit hexadecimal, respectively. This item need not be set if [ No Authentication ] was selected. (15)[SA ESP SPI (inbound)] Set the SA SPI value for inbound. Set a desired value in a range of 256 to 4294967295. Since this setting is used as an ID for identifying the SA, be careful not to specify an...
Page 58
1-44 IPsec Settings (IPsec) (20)[SA AH SPI (inbound)] Set the SA SPI value for inbound. Set a desired value in a range of 256 to 4294967295. Since this setting is used as an ID for identifying the SA, be careful not to specify an inbound SPI whose value is already used the SPI for other AH. Note z To use this camera using IPsec, the communi cating destinations and network must be set beforehand. For these settings, contact your System Administrator. z If any setting is changed from the [ IPsec]...
Page 59
1-45 1 1Detailed Settings Setting the Items Requirin g Rebooting (Reboot Item) (1) [LAN] IP address and other settings required for LAN Connection ( P. 1-8) (2) [IPv6] Settings relating to use of IPv6 ( P. 1-9) (3) [Installation Conditions] Settings relating to camera installation conditions ( P. 1-17) (4) [MPEG-4] Settings relating to image size and frame rate in MPEG-4 ( P. 1-19) (5) [HTTP Server] HTTP port number settings ( P. 1-31) The following items that require rebooting, if changed,...
Page 60
1-46 Setting the Items Requiring Rebooting (Reboot Item) Note These settings relate to network connection. If any setting is changed to a value that may disable camera connection from the active browser, the following dialog box is displayed to alert the user. To apply the new setting, click [ OK]. Depending on the new setting, it may not be possible to connect to the camera again after rebooting. In this case, a candidate URI is displayed as shown below, if available, to facilitate reconnection to...