Canon network camera VBC60 User Manual
Here you can view all the pages of manual Canon network camera VBC60 User Manual. The Canon manuals for Camera are available online for free. You can easily download all the documents as PDF.
Page 51
1-35 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) 1 1Detailed Settings Motion Detection (1) [Motion Detection Event] Shows whether motion detection events are enabled/disabled. To change this setting, use Motion Detection Setting Tool in VBAdmin Tools ( P. 2-34). When motion detection events are enabled, the camera provides event notification to a viewer capable of displaying the detected event, such as the Admin Viewer. (2) [ON Event Operation] Select the...
Page 52
1-36 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) (5) [Upload]Select the upload operation. If [ Enable] is selected, upload is performed every time a motion detection event occurs. To use this function, the [ General Upload] sub-menu and [ HTTP Upload] or [FTP Upload] sub-menu must also be set from the [ Upload] menu. (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail notification is performed...
Page 53
1-37 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) 1 1Detailed Settings External Device Input (1) [External Device Input Event] Select whether to [ Enable] or [Disable ] external device input events. (2) [ON Event Operation] Select the operation to be performed upon an ON event. If [ Enable] is selected, (4) Preset, (5) Upload, and (6) E-mail Notification are displayed. When an ON input is received from an external device (ON event), the processes set in (4), (5)...
Page 54
1-38 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) (7) [Audio Playback at ON Event]Select the audio playback operation to be performed upon an ON event. If [ Enable] is selected, the sound specified in [ Sound Clip] is played when an ON event is input from an external device. (8) [Audio Playback at OFF Event] Select the audio playback operation to be performed upon an OFF event. If [ Enable] is selected, the sound specified in [ Sound Clip] is played when the...
Page 55
1-39 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) 1 1Detailed Settings Sound Clip Upload (1) [Browse File] Specify the audio file you want to register as the sound clip, and then click the [ Add] button. (2) [Sound Clip Name] Set the name of the audio file to be registered as a sound playback (using up to 15 characters). To delete a registered sound, click [Delete ] next to the name of the playback sound you want to delete. Tip You can set only audio files...
Page 56
1-40 Setting User Access Privileges (Access Control) Authorized User Account (1) [User Name], [Password]Enter the user name and password and then click [ Add]. The authorized user will be added to the user list. The user name can consist of up to eight (single-byte) characters of A to Z, a to z, 0 to 9, - (hyphen) and - (underscore). The password can consist of up to eight (single-byte) ASCII characters (space or printable characters). (2) [User List] A list of authorized users is shown. User...
Page 57
1-41 Setting User Access Privileges (Access Control) 1 1Detailed Settings User Authority [Privileged Camera Control], [Camera Control], [Image Distribution], [Audio Distribution] Set the user privileges of aut horized users and guest user s. Select the check boxes corresponding to the items you want to permit for each user. Host Access Restriction (1) [Host List] A list of hosts from which access is permitted and restricted is shown. (2) [Apply the list to HTTP Server] If [Ye s ] is selected, the host...
Page 58
1-42 Setting User Access Privileges (Access Control) Note zIf no host list is available, access is permitted to all hosts. z If a host list is given that indicates prohibition of all accesses, the host restriction function is disabled and access is permitted to all hosts. z To prohibit access via a proxy server in HTTP connection, a proxy server address must be set. z If Host Access Restriction is set wrongly, access to the setting pages itself may be prohibited, in which case restoring the factory...
Page 59
1-43 Setting User Access Privileges (Access Control) 1 1Detailed Settings Example of description Example 1. Prohibit access from a given access !172.20.0.10 Access from the host whose address is 172.20.0.10 is prohibited. Example 2. Prohibit access from hosts in a given range !172.20.0.0-172.20.0.20 Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is prohibited. Example 3. Permit access from hosts in a given range and prohibit access from all other hosts...
Page 60
1-44 IPsec Settings (IPsec) IPsec Set IPsec Sets 1 to 5 are available, where IPsec settings for each communication using each IPsec Set. (1) [IPsec]Select [ Manual] if IPsec will be used. Select [ Disable] if IPsec will not be used. (2) [IPsec Mode] Select [ Tunnel Mode] or [ Transport Mode] as the IPsec operation mode. (3) [Destination Address (IPv4/IPv6)] Enter the IP address of the connection destination. (4) [Source Address (IPv4/IPv6)] Enter the IP address of the sender. (5) [Security Protocol]...