Canon network camera VBC60 User Manual
Have a look at the manual Canon network camera VBC60 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
1-35 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) 1 1Detailed Settings Motion Detection (1) [Motion Detection Event] Shows whether motion detection events are enabled/disabled. To change this setting, use Motion Detection Setting Tool in VBAdmin Tools ( P. 2-34). When motion detection events are enabled, the camera provides event notification to a viewer capable of displaying the detected event, such as the Admin Viewer. (2) [ON Event Operation] Select the operation to be performed upon an ON event. If [ Enable] is selected, (5), Upload and (6), E-mail Notification are displayed. When the mode changes to [ Detected] (ON event), the process set in (5) or (6) is performed. (3) [OFF Event Operation] Select the operation to be performed upon an OFF event. If [ Enable] is selected, (5), Upload and (6), E-mail Notification are displayed. When the [ Detected] mode is finished (OFF event), the process set in (5) or (6) is performed. (4) [Continuous Motion Operation] Select the operation to be performed during motion detection. If [ Enable] is selected, (5), Upload and (6), E-mail Notification are displayed. When the mode changes to [ Detected] (detected period), the process set in (5) or (6) is performed. Tip Regardless of the image buffer frame rate setting, only a single image will be uploaded when a timer event occurs.
1-36 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) (5) [Upload]Select the upload operation. If [ Enable] is selected, upload is performed every time a motion detection event occurs. To use this function, the [ General Upload] sub-menu and [ HTTP Upload] or [FTP Upload] sub-menu must also be set from the [ Upload] menu. (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail notification is performed every time a motion detection event occurs. To use this function, the [E-mail Notification ] sub-menu must also be set from the [ Upload] menu. (7) [Audio Playback at ON Event] Select the audio playback operation to be performed upon an ON event. If [ Enable] is selected, the sound specified under [ Sound Clip] will be played when the mode changes to [Detected] (ON event). (8) [Audio Playback at OFF Event] Select the audio playback operation to be performed upon an OFF event. If [ Enable] is selected, the sound specified under [ Sound Clip] will be played when the mode changes to [Detected] (OFF event). (9) [Sound Clip] Select the audio to be played. For registration of sound clips, see Sound Clip Upload ( P. 1-39). (10)[Volume] Set the sound clip volume as an integer between 1 and 100. The greater the value, the larger the volume. (11)[Automatic Tracking at ON Event] Select the automatic tracking operation. If [ Enable] is selected, the camera will automatically start shaking its head upon entering the [ Detected] mode (ON event). (12)[Maximum Tracking Time (sec.)] Set the time during which automatic tracking is continued between 1 and 300 seconds. Note zThe motion detection function cannot be interlocked with external device output. However, interlocking is possible if the optional recording software RM-64/RM-25/RM-9 is used. z For the notes on use of motion detection, see Notes on Use of Motion Detection, Tracking, Stream for Recording, Image Stabilizer and Bundled Recording Software RM-Lite. ( Start Guide )
1-37 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) 1 1Detailed Settings External Device Input (1) [External Device Input Event] Select whether to [ Enable] or [Disable ] external device input events. (2) [ON Event Operation] Select the operation to be performed upon an ON event. If [ Enable] is selected, (4) Preset, (5) Upload, and (6) E-mail Notification are displayed. When an ON input is received from an external device (ON event), the processes set in (4), (5) and (6) are performed. (3) [OFF Event Operation] Select the operation to be performed upon an OFF event. If [ Enable] is selected, (4) Preset, (5) Upload, and (6) E-mail Notification are displayed. When an OFF input is received from an external device (OFF event), the processes set in (4), (5) and (6) are performed. (4) [Preset] Select the preset position. If you want to operate the camera according to events notified from an external device, set an appropriate preset position using Preset Setting Tool of VBAdmin Tools ( P. 2-22), and then select the corresponding preset between [ Preset 1] and [Preset 20]. If the camera need not be operated, select [ None]. (5) [Upload] Select the upload operation. If [ Enable] is selected, upload is performed when an event is input from an external device. To use this function, the [ General Upload] sub-menu and [HTTP Upload ] or [FTP Upload ] sub-menu must also be set from the [ Upload] menu. (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail notification is performed when an event is input from an external device, provided that [ Enable ] is selected. To use this function, the [ E-mail Notification] sub-menu must also be set from the [ Upload] menu.
1-38 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) (7) [Audio Playback at ON Event]Select the audio playback operation to be performed upon an ON event. If [ Enable] is selected, the sound specified in [ Sound Clip] is played when an ON event is input from an external device. (8) [Audio Playback at OFF Event] Select the audio playback operation to be performed upon an OFF event. If [ Enable] is selected, the sound specified in [ Sound Clip] is played when the event input from an external device turns OFF. (9) [Sound Clip] Select the audio to be played. For registration of sound clips, see Sound Clip Upload ( P. 1-39). (10)[Volume] Set the sound clip volume as an integer between 1 and 100. The greater the value, the larger the volume. Interval Timer (1) [Interval Timer Event] Select the time event setting from [ Enable] or [Disable ]. If you select [ Enable], (2) Interval of the Timer, (3)Upload and (4) E-mail Notification appear. (2) [Interval of the Timer] Select a desired timer interval from the pull-down menu in a range of [ 1 sec.] to [24 hours ]. (3) [Upload] Select the upload operation. If [ Enable] is selected, upload is performed at the specified intervals. To use this function, the [ Upload] menu must also be set. (4) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail notification is performed at the specified intervals. To use this function, the [ E-mail Notification] sub-menu must also be set from the [ Upload] menu.
1-39 Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event) 1 1Detailed Settings Sound Clip Upload (1) [Browse File] Specify the audio file you want to register as the sound clip, and then click the [ Add] button. (2) [Sound Clip Name] Set the name of the audio file to be registered as a sound playback (using up to 15 characters). To delete a registered sound, click [Delete ] next to the name of the playback sound you want to delete. Tip You can set only audio files whose playback time is not longer than 20 seconds and file type is .wav (µ-law PCM 8 bits, sampling frequency 8000 Hz, monaural).
1-40 Setting User Access Privileges (Access Control) Authorized User Account (1) [User Name], [Password]Enter the user name and password and then click [ Add]. The authorized user will be added to the user list. The user name can consist of up to eight (single-byte) characters of A to Z, a to z, 0 to 9, - (hyphen) and - (underscore). The password can consist of up to eight (single-byte) ASCII characters (space or printable characters). (2) [User List] A list of authorized users is shown. User privileges can be set for these users. Up to 50 users can be registered other than the Administrator (root). Also, the user list can be sorted using the S and T buttons on the right. To delete a user, select the applicable user from the user list and then click [ Delete]. You can set the following items. z Authorized User Account Register users who can access this camera. z User Authority Set the privileges of authorized users and guest users. z Host Access Restriction Specify the hosts from which access is permit and restricted.
1-41 Setting User Access Privileges (Access Control) 1 1Detailed Settings User Authority [Privileged Camera Control], [Camera Control], [Image Distribution], [Audio Distribution] Set the user privileges of aut horized users and guest user s. Select the check boxes corresponding to the items you want to permit for each user. Host Access Restriction (1) [Host List] A list of hosts from which access is permitted and restricted is shown. (2) [Apply the list to HTTP Server] If [Ye s ] is selected, the host list is applied to HTTP server access. Not only access from various viewers, but access to the top pa ge and setting pages is also limited. The list is also applied when distributing image and audio. (3) [Apply the list to Image Transmission] If you select [ Ye s], the host list is applied when the image transmission function is used. Access from various viewers can be restricted. The list is also applied when distributing audio. (4) [Apply the list to Audio Transmission] If [Ye s ] is selected, the host list is applied when the audio distribution function is used. Utilization of audio can be restricted. Tip Authorized users can have higher privileges than guest users.
1-42 Setting User Access Privileges (Access Control) Note zIf no host list is available, access is permitted to all hosts. z If a host list is given that indicates prohibition of all accesses, the host restriction function is disabled and access is permitted to all hosts. z To prohibit access via a proxy server in HTTP connection, a proxy server address must be set. z If Host Access Restriction is set wrongly, access to the setting pages itself may be prohibited, in which case restoring the factory settings will become the only means for recovery. z If host access control is implemented, this camera cannot be accessed by IPv6. z If the [ Host List] or [ Apply the list to HTTP Server ] setting is changed, the camera may become no longer accessible from the active browser. Check beforehand the precautions explained in Notes in Setting the Items Requiring Rebooting (Reboot Item) ( P. 1-49). Tip The Host Access Restriction function restricts the hosts on which the viewer and other client applications are running, where access is restricted using a list containing one or more entries in the following format. Listing Format [!] addr [ -addr2 ] z addr conforms to the standard IP address format. z The addresses addr and addr2 give the IP address range, and if IP address A is between addr and addr2, A is included in the range of addr to addr2. It is possible to omit addr2, in which case the value of addr2 becomes the same as that of addr. z If the entry starts with !, access is prohibited. If ! does not precede the entry, access is permitted. z If a given host address corresponds to multiple entries, whether access is permitted or prohibited is determined by the setting of the first applicable entry after the beginning of the host list. Accordingly, take note that in Examples 3 to 5 below, an entry of permitted address must be specified in an entry of prohibited address. z Redundant and conflicting entries in the list are automatically deleted from the list. z If the host address does not belong to any entry, access is permitted.
1-43 Setting User Access Privileges (Access Control) 1 1Detailed Settings Example of description Example 1. Prohibit access from a given access !172.20.0.10 Access from the host whose address is 172.20.0.10 is prohibited. Example 2. Prohibit access from hosts in a given range !172.20.0.0-172.20.0.20 Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is prohibited. Example 3. Permit access from hosts in a given range and prohibit access from all other hosts 172.20.0.10-172.20.0.12 !0.0.0.0-255.255.255.0 Access is permitted only from the hosts whose address is in a range of 172.20.0.10 to 172.20.0.12. Example 4. Prohibit access from hosts in a gi ven range, but permit access from hosts at certain addresses within that range 172.20.0.10 !172.20.0.0-172.20.0.20 Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is prohibited, but access is permitted only fr om the host whose address is 172.20.0.10. Example 5. Prohibit access from hosts in a gi ven range, but permit access from hosts in a given range within that range 172.20.0.10-172.20.0.15 !172.20.0.0-172.20.0.20 Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is prohibited, but access is permitted from the hosts whose address is in a range of 172.20.0.10 to 172.20.0.15.
1-44 IPsec Settings (IPsec) IPsec Set IPsec Sets 1 to 5 are available, where IPsec settings for each communication using each IPsec Set. (1) [IPsec]Select [ Manual] if IPsec will be used. Select [ Disable] if IPsec will not be used. (2) [IPsec Mode] Select [ Tunnel Mode] or [ Transport Mode] as the IPsec operation mode. (3) [Destination Address (IPv4/IPv6)] Enter the IP address of the connection destination. (4) [Source Address (IPv4/IPv6)] Enter the IP address of the sender. (5) [Security Protocol] Select [ ESP], [AH] or [ESP and AH ] as the IPsec protocol to be used. If [ ESP] is selected, enter only the setting items relating to ESP. If [ AH ] is selected, enter only the setting items relating to AH. If [ ESP and AH ] is selected, enter all setting items. You can set the following items. z Various settings can be specified for up to five communicating devices.