Canon network camera VBM600VE User Manual
Here you can view all the pages of manual Canon network camera VBM600VE User Manual. The Canon manuals for Camera are available online for free. You can easily download all the documents as PDF.
Page 61
[Upload] Setting HTTP/FTP Upload and E-mail Notification 5-17 5 Setting Page E-mail Notification (1) [Notification] Select [Text Only] or [Text with Image] as the content of notification. If [Upload] is set to [Upload Disabled], [Text with Image] will not be available. (2) [Mail Server Name] Enter the host name or IP address of the SMTP server (using up to 63 characters). (3) [Mail Server Port] Enter the port number of the SMTP server (factory default setting is [25]). (4) [Sender (From)] Set...
Page 62
5-18 Image Server (1) [Maximum Number of Clients] Set the maximum number of clients that can be connected to the camera at the same time. Up to 30 clients can be set. If 0 is set, connection is prohibited except for the Administrator. (2) [Camera Control Queue Length] Set the maximum queue length for clients requesting camera control privilege from the viewer. The maximum number is 30. Enter an integer from 0 to 30. If 0 is set, camera control is prohibited except for the Administrator. (3)...
Page 63
[Server] Setting the Image Server, Audio Server and HTTP Server 5-19 5 Setting Page HTTP Server (1) [Authentication Method] Set the authentication method used with the HTTP server to [Basic Authentication] or [Digest Authentication]. (2) [HTTP Port] Set the HTTP port number to 80 or in the range of 1024 to 65535. Normally [80] (factory default setting) is used. (3) [HTTPS Port] Set the HTTPS port number to 443 or in the range of 1024 to 65535. Normally [443] (factory default setting) is used....
Page 64
5-20 Image Buffer (1) [Frame Rate] Enter the frame rate of image to be uploaded. (2) [Pre-event Buffer (number of image frames)] Set the number of images to be buffered before the event. (3) [Post-event Buffer (number of image frames)] Set the number of images to be buffered after the event. Volume Detection (1) [Volume Detection Event] Set volume detection to [Disable] or [Enable]. (2) [Detection Criteria] Set the criteria for generating volume detection events to [The reference volume level...
Page 65
[Event] Setting Image Buffer, Volume Detection, External Device Input, Audio Playback and Timer 5-21 5 Setting Page (8) [Upload] Select the upload operation to be performed. If [Enable] is selected, upload is performed when a volume detection event occurs. To use this function, the [General Upload] sub-menu and [HTTP Upload] or [FTP Upload] sub-menu must also be set from the [Upload] menu (p. 5-15). (9) [E-mail Notification] Select the e-mail notification operation to be performed. If [Enable] is...
Page 66
5-22 Timer (1) [Timer Event Setting] Select [Disable] or [Enable] for timer event. (2) [Start Time] Set the start time of the timer event in 24-hour format. (3) [Repeat Setting] If [Enable] is selected, timer events will be generated according to settings in (4) [Repeat Interval] and (5) [Repeat Count]. (4) [Repeat Interval] Select [1 sec.] [5 sec.] [10 sec.] [30 sec.] [1 min.] [5 min.] [10 min.] [15 min.] [20 min.] [30 min.] [1 hour] [3 hours] [6 hours] or [12 hours] for the upload and e-...
Page 67
5-23 5 Setting Page Authorized User Account (1) [User Name], [Password] Enter the user name and password and then click [Add]. The authorized user will be added to the user list. The user name can consist of up to 15 (single-byte) characters using A to Z, a to z, 0 to 9, “-” (hyphen) and “_” (underscore). The password can consist of 6 to15 (single-byte) ASCII characters (space or printable characters). (2) [User List] A list of authorized users is shown. User authorities can be set for these...
Page 68
5-24 Note If the same address is duplicated, the policy for the address that appears highest on the list will be applied. IPv6 Host Access Restrictions (1) [Apply Host Access Restrictions] Set IPv6 host access restrictions to [Disable] or [Enable]. (2) [Default Policy] If IPv6 host access restrictions are applied, select [Authorize Access] or [Prohibit Access] for the default policy. (3) [Prefix / Prefix Length] Create a list of permitted hosts and restricted hosts and set IPv6 address access...
Page 69
5-25 5 Setting Page IPsec (1) [IPsec] Key settings for use with IPsec can be selected as [Auto Key Exchange] or [Manual]. Auto Key Exchange Settings (1) [IPsec SA Encryption Algorithm] Set the IPsec SA encryption algorithm to [AES->3DES], [AES->3DES->DES] or [AES->3DES->DES ->NULL]. The specified algorithm will be checked for an applicable encryption algorithm starting from the left. (2) [IPsec SA Authentication Algorithm] Set the IPsec SA authentication algorithm to [HMAC_SHA1_96] or...
Page 70
5-26 (8) [IKE Pre-Shared Key] Enter the pre-shared key for IKE (auto key exchange) (up to 127 characters). Note If auto key exchange is used, it will take approximately 5 to 10 seconds before communication with the camera starts. IPsec Set (Manual) IPsec Sets 1 to 5 are available, and you can specify IPsec settings for one communication device for each IPsec Set. (1) [IPsec Set] Set IPsec Set to [Disable], [Enable in IPv4] or [Enable in IPv6]. (2) [IPsec Mode] Set IPsec mode to [Tunnel Mode]...