Canon network camera VBH610VE User Manual
Here you can view all the pages of manual Canon network camera VBH610VE User Manual. The Canon manuals for Camera are available online for free. You can easily download all the documents as PDF.
Page 61
[Upload] Setting HTTP/FTP Upload and E-mail Notification 61 5 Setting Page [User Setting] Images are uploaded according to the file naming method specified in [Subdirectory Name to Create] and [File Name to Create]. [Subdirectory Name to Create], [File Name to Create] If file naming is set to [User Setting], enter the subdirectory name to be created as well as the name of the created file (using up to 127 characters). Parameters can be specified in the entry with the “%” character (p. 148). (7)...
Page 62
62 Video Server (1) [Maximum Number of Clients] Set the maximum number of clients that can be connected to the camera at the same time. Up to 30 clients can be set. If 0 is set, connection is prohibited except for the Administrator. (2) [Camera Control Queue Length] Set the maximum queue length for clients requesting camera control privilege from the viewer. The maximum number is 30. Enter an integer from 0 to 30. If 0 is set, camera control is prohibited except for the Administrator. (3)...
Page 63
[Server] Setting the Video Server, Audio Server and HTTP Server 63 5 Setting Page HTTP Server (1) [Authentication Method] Set the authentication method used with the HTTP server to [Basic Authentication] or [Digest Authentication]. (2) [HTTP Port] Set the HTTP port number to 80 or in the range of 1024 to 65535. Normally [80] (factory default setting) is used. (3) [HTTPS Port] Set the HTTPS port number to 443 or in the range of 1024 to 65535. Normally [443] (factory default setting) is used....
Page 64
64 Video Record Setting (1) [Video Record Action] Select the destination of a video recorded when an event occurs. To record to a server selected on the [Upload] in the setting page, select [Upload] and to record to an SD card inserted in the camera, select [Record to SD Card]. Note The size and format of video recorded according to the [Video Record Action] settings are as follows: Settings must be made in the above setting page to make an actual video recording.Volume Detection (1) [Volume...
Page 65
[Event] Setting Video Record, Volume Detection, Audio Playback and Timer 65 5 Setting Page Tool under Admin Tools (p. 96). If there is no need for additional camera operation, select [None]. (9) [Video Record] Specify the video record action. If [Enable] is selected, video will be transmitted to the destination selected in [Video Record Action] (p. 64) when a volume detection event occurs. (10)[E-mail Notification] Select the e-mail notification operation to be performed. If [Enable] is selected,...
Page 66
66 (3) [Active Event Operation] Select the operation to be performed upon an active event. If [Enable] is selected, (6) [Preset], (7) [Video Record] and (8) [E-mail Notification] will be executed according to their settings upon an active event. (4) [Inactive Event Operation] Select the operation to be performed upon an inactive event. If [Enable] is selected, (6) [Preset], (7) [Video Record] and (8) [E-mail Notification] will be executed according to their settings upon an inactive event. (5)...
Page 67
[Event] Setting Video Record, Volume Detection, Audio Playback and Timer 67 5 Setting Page (5) [Video Record] Specify the video record action. When [Enable] is selected, video will be transmitted to the destination selected in [Video Record Action] (p. 64) when a timer event occurs. (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [Enable] is selected, e-mail notification is performed when a timer event occurs. To use this function, the [E-mail Notification]...
Page 68
68 Authorized User Account (1) [User Name], [Password] Enter the user name and password and then click [Add]. The authorized user will be added to the user list. The user name can consist of up to 15 (single-byte) characters using A to Z, a to z, 0 to 9, “-” (hyphen) and “_” (underscore). The password can consist of 6 to15 (single-byte) ASCII characters (space or printable characters). (2) [User List] A list of authorized users is shown. User authorities can be set for these users. Up to 50...
Page 69
[Access Control] Setting User Access Privileges 69 5 Setting Page IPv6 Host Access Restrictions (1) [Apply Host Access Restrictions] Set IPv6 host access restrictions to [Disable] or [Enable]. (2) [Default Policy] If IPv6 host access restrictions are applied, select [Authorize Access] or [Prohibit Access] for the default policy. (3) [Prefix / Prefix Length] Create a list of permitted hosts and restricted hosts and set IPv6 address access for each host to [Yes] or [No]. You can specify the...
Page 70
70 IPsec (1) [IPsec] Key settings for use with IPsec can be selected as [Auto Key Exchange] or [Manual]. Auto Key Exchange Settings (1) [IPsec SA Encryption Algorithm] Set the IPsec SA encryption algorithm to [AES- >3DES], [AES->3DES->DES] or [AES->3DES->DES - >NULL]. The specified algorithm will be checked for an applicable encryption algorithm starting from the left. (2) [IPsec SA Authentication Algorithm] Set the IPsec SA authentication algorithm to [HMAC_SHA1_96] or [HMAC_SHA1_96->...