Home > Canon > Camera > Canon network camera VBC60 User Manual

Canon network camera VBC60 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon network camera VBC60 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							1-35
    Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event)
    1
    1Detailed Settings
    Motion Detection
    (1) [Motion Detection Event]
    Shows whether motion detection events are enabled/disabled. To change this setting, use 
    Motion Detection Setting Tool in VBAdmin Tools (  P. 2-34). When motion detection events 
    are enabled, the camera provides event notification to a viewer capable of displaying the 
    detected event, such as the Admin Viewer.
    (2) [ON Event Operation] Select the operation to be performed upon an ON event. If [ Enable] is selected, (5), Upload 
    and (6), E-mail Notification are displayed. When the mode changes to [ Detected] (ON 
    event), the process set in (5) or (6) is performed.
    (3) [OFF Event Operation] Select the operation to be performed upon an OFF event. If [ Enable] is selected, (5), Upload 
    and (6), E-mail Notification are displayed. When the [ Detected] mode is finished (OFF 
    event), the process set in (5) or (6) is performed.
    (4) [Continuous Motion Operation] Select the operation to be performed during motion detection. If [ Enable] is selected, (5), 
    Upload and (6), E-mail Notification are displayed. When the mode changes to [ Detected] 
    (detected period), the process set in (5) or (6) is performed.
    Tip
    Regardless of the image buffer frame rate setting, only a single image will be uploaded when 
    a timer event occurs. 
    						
    							1-36
    Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event)
    (5) [Upload]Select the upload operation. If [ Enable] is selected, upload is performed every time a motion 
    detection event occurs. To use this function, the [ General Upload] sub-menu and [ HTTP 
    Upload] or [FTP Upload] sub-menu must also be set from the [ Upload] menu.
    (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail 
    notification is performed every time a motion detection event occurs. To use this function, the 
    [E-mail Notification ] sub-menu must also be set from the [ Upload] menu.
    (7) [Audio Playback at ON Event] Select the audio playback operation to be performed upon an ON event. If [ Enable] is 
    selected, the sound specified under [ Sound Clip] will be played when the mode changes to 
    [Detected] (ON event).
    (8) [Audio Playback at OFF Event] Select the audio playback operation to be performed upon an OFF event. If [ Enable] is 
    selected, the sound specified under [ Sound Clip] will be played when the mode changes to 
    [Detected] (OFF event).
    (9) [Sound Clip] Select the audio to be played. For registration of sound clips, see Sound Clip Upload (  P.  
    1-39).
    (10)[Volume]
    Set the sound clip volume as an integer between 1 and 100. The greater the value, the larger 
    the volume. 
    (11)[Automatic Tracking at ON Event]
    Select the automatic tracking operation. If [ Enable] is selected, the camera will automatically 
    start shaking its head upon entering the [ Detected] mode (ON event). 
    (12)[Maximum Tracking Time (sec.)]
    Set the time during which automatic tracking is continued between 1 and 300 seconds. 
    Note
    zThe motion detection function cannot be interlocked with external device output. However, 
    interlocking is possible if the optional recording software RM-64/RM-25/RM-9 is used.
    z For the notes on use of motion detection, see Notes on Use of Motion Detection, Tracking, 
    Stream for Recording, Image Stabilizer and Bundled Recording Software RM-Lite. (  Start 
    Guide ) 
    						
    							1-37
    Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event)
    1
    1Detailed Settings
    External Device Input
    (1) [External Device Input Event]
    Select whether to [ Enable] or [Disable ] external device input events.
    (2) [ON Event Operation] Select the operation to be performed upon an ON event. If [ Enable] is selected, (4) Preset, 
    (5) Upload, and (6) E-mail Notification are displayed. When an ON input is received from 
    an external device (ON event), the processes set in (4), (5) and (6) are performed.
    (3) [OFF Event Operation] Select the operation to be performed upon an OFF event. If [ Enable] is selected, (4) Preset, 
    (5) Upload, and (6) E-mail Notification are displayed. When an OFF input is received from 
    an external device (OFF event), the processes set in (4), (5) and (6) are performed.
    (4) [Preset] Select the preset position. If you want to operate the camera according to events notified from 
    an external device, set an appropriate preset position using Preset Setting Tool of VBAdmin 
    Tools (  P. 2-22), and then select the corresponding preset between [ Preset 1] and [Preset 
    20]. If the camera need not be operated, select [ None]. 
    (5) [Upload] Select the upload operation. If [ Enable] is selected, upload is performed when an event is 
    input from an external device. To use this function, the [ General Upload] sub-menu and 
    [HTTP Upload ] or [FTP Upload ] sub-menu must also be set from the [ Upload] menu.
    (6) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail 
    notification is performed when an event is input from an external device, provided that 
    [ Enable ] is selected. To use this function, the [ E-mail Notification] sub-menu must also be 
    set from the [ Upload] menu. 
    						
    							1-38
    Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event)
    (7) [Audio Playback at ON Event]Select the audio playback operation to be performed upon an ON event. If [ Enable] is 
    selected, the sound specified in [ Sound Clip] is played when an ON event is input from an 
    external device.
    (8) [Audio Playback at OFF Event] Select the audio playback operation to be performed upon an OFF event. If [ Enable] is 
    selected, the sound specified in [ Sound Clip] is played when the event input from an external 
    device turns OFF.
    (9) [Sound Clip] Select the audio to be played. For registration of sound clips, see Sound Clip Upload (  P.  
    1-39).
    (10)[Volume]
    Set the sound clip volume as an integer between 1 and 100. The greater the value, the larger 
    the volume. 
    Interval Timer
    (1) [Interval Timer Event]
    Select the time event setting from [ Enable] or [Disable ]. If you select [ Enable], (2) Interval of 
    the Timer, (3)Upload and (4) E-mail Notification appear. 
    (2) [Interval of the Timer] Select a desired timer interval from the pull-down menu in a range of [ 1 sec.] to [24 hours ].
    (3) [Upload] Select the upload operation. If [ Enable] is selected, upload is performed at the specified 
    intervals. To use this function, the [ Upload] menu must also be set.
    (4) [E-mail Notification] Select the e-mail notification operation to be performed. If [ Enable] is selected, e-mail 
    notification is performed at the specified intervals. To use this function, the [ E-mail Notification] 
    sub-menu must also be set from the [ Upload] menu. 
    						
    							1-39
    Setting the Image Buffer, Motion Detection, Audio Playback and Interval Timer (Event)
    1
    1Detailed Settings
    Sound Clip Upload
    (1) [Browse File]
    Specify the audio file you want to register as the sound clip, and then click the [ Add] button. 
    (2) [Sound Clip Name] Set the name of the audio file to be registered as a sound playback (using up to 15 
    characters). To delete a registered sound, click [Delete ] next to the name of the playback 
    sound you want to delete.
    Tip
    You can set only audio files whose playback time is not longer than 20 seconds and file type 
    is .wav (µ-law PCM 8 bits, sampling frequency 8000 Hz, monaural). 
    						
    							1-40
    Setting User Access Privileges (Access Control)
    Authorized User Account
    (1) [User Name], [Password]Enter the user name and password and then click [ Add]. The authorized user will be added to 
    the user list.
    The user name can consist of up to  eight (single-byte) characters of A to Z, a to z, 0 to 9, - 
    (hyphen) and - (underscore).
    The password can consist of up to eight (single-byte) ASCII characters (space or printable 
    characters).
    (2) [User List] A list of authorized users  is shown. User privileges can be set for these users. Up to 50 users 
    can be registered other than the Administrator (root).
    Also, the user list can be sorted using the  S and T  buttons on the right.
    To delete a user, select the applicable user from the user list and then click [ Delete].
    You can set the following items.
    z
    Authorized User Account
    Register users who can access this camera.
    z User Authority
    Set the privileges of authorized users and guest users.
    z Host Access Restriction
    Specify the hosts from which access is permit and restricted. 
    						
    							1-41
    Setting User Access Privileges (Access Control)
    1
    1Detailed Settings
    User Authority
    [Privileged Camera Control], [Camera Control], [Image Distribution], [Audio Distribution] 
    Set the user privileges of aut horized users and guest user s. Select the check boxes 
    corresponding to the items you want to permit for each user.
    Host Access Restriction
    (1) [Host List]
    A list of hosts from which access is permitted and restricted is shown.
    (2) [Apply the list to HTTP Server] If [Ye s ] is selected, the host list is applied to  HTTP server access. Not only access from 
    various viewers, but access to the top pa ge and setting pages is also limited.
    The list is also applied when distributing image and audio.
    (3) [Apply the list to Image Transmission] If you select [ Ye s], the host list is applied when the image transmission function is used. 
    Access from various viewers can be restricted.
    The list is also applied when distributing audio.
    (4) [Apply the list to Audio Transmission] If [Ye s ] is selected, the host list is applied when the audio distribution function is used. 
    Utilization of audio can be restricted.
    Tip
    Authorized users can have higher privileges than guest users. 
    						
    							1-42
    Setting User Access Privileges (Access Control)
    Note
    zIf no host list is available, access is permitted to all hosts.
    z If a host list is given that indicates prohibition of all accesses, the host restriction function is 
    disabled and access is permitted to all hosts.
    z To prohibit access via a proxy server in HTTP connection, a proxy server address must be 
    set.
    z If Host Access Restriction is set wrongly, access to the setting pages itself may be 
    prohibited, in which case restoring the factory settings will become the only means for 
    recovery.
    z If host access control is implemented, this camera cannot be accessed by IPv6.
    z If the [ Host List] or [ Apply the list to HTTP Server ] setting is changed, the camera may 
    become no longer accessible from the active browser. Check beforehand the precautions 
    explained in Notes in Setting the Items Requiring Rebooting (Reboot Item) (  P. 1-49).
    Tip
    The Host Access Restriction function restricts the hosts on which the viewer and other client 
    applications are running, where access is restricted using a list containing one or more 
    entries in the following format.
    Listing Format
    [!] addr [ -addr2 ]
    z addr conforms to the standard IP address format.
    z The addresses addr and addr2 give the IP address range, and if IP address A is 
    between addr and addr2, A is included in the range of addr to addr2. It is possible to 
    omit addr2, in which case the value of addr2 becomes the same as that of addr.
    z If the entry starts with !, access is prohibited. If ! does not precede the entry, 
    access is permitted.
    z If a given host address corresponds to multiple entries, whether access is permitted 
    or prohibited is determined by the setting of the first applicable entry after the 
    beginning of the host list. Accordingly, take  note that in Examples 3 to 5 below, an 
    entry of permitted address must be specified in an entry of prohibited address.
    z Redundant and conflicting entries in the list are automatically deleted from the list.
    z If the host address does not belong to any entry, access is permitted. 
    						
    							1-43
    Setting User Access Privileges (Access Control)
    1
    1Detailed Settings
    Example of description
    Example 1. Prohibit access from a given access
    !172.20.0.10
    Access from the host whose address is 172.20.0.10 is prohibited.
    Example 2. Prohibit access from hosts in a given range
    !172.20.0.0-172.20.0.20
    Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is prohibited.
    Example 3. Permit access from hosts in a given range and prohibit access from all other 
    hosts
    172.20.0.10-172.20.0.12
    !0.0.0.0-255.255.255.0
    Access is permitted only from the hosts whose address is in a range of 172.20.0.10 to 
    172.20.0.12.
    Example 4. Prohibit access from hosts in a gi ven range, but permit access from hosts at 
    certain addresses within that range
    172.20.0.10
    !172.20.0.0-172.20.0.20
    Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is 
    prohibited, but access is permitted only fr om the host whose address is 172.20.0.10.
    Example 5. Prohibit access from hosts in a gi ven range, but permit access from hosts in a 
    given range within that range
    172.20.0.10-172.20.0.15
    !172.20.0.0-172.20.0.20
    Access from the hosts whose address is in a range of 172.20.0.0 to 172.20.0.20 is 
    prohibited, but access is permitted from the hosts whose address is in a range of 
    172.20.0.10 to 172.20.0.15. 
    						
    							1-44
    IPsec Settings (IPsec)
    IPsec Set
    IPsec Sets 1 to 5 are available, where IPsec settings for each communication using each IPsec 
    Set.
    (1) [IPsec]Select [ Manual] if IPsec will be used. Select [ Disable] if IPsec will not be used.
    (2) [IPsec Mode] Select [ Tunnel Mode] or [ Transport Mode] as the IPsec operation mode.
    (3) [Destination Address (IPv4/IPv6)] Enter the IP address of the connection destination.
    (4) [Source Address (IPv4/IPv6)] Enter the IP address of the sender.
    (5) [Security Protocol] Select [ ESP], [AH] or [ESP and AH ] as the IPsec protocol to be used.
    If [ ESP] is selected, enter only the setting items relating to ESP.
    If [ AH ] is selected, enter only the setting items relating to AH.
    If [ ESP and AH ] is selected, enter all setting items.
    You can set the following items.
    z
    Various settings can be specified for up to five communicating devices. 
    						
    All Canon manuals Comments (0)

    Related Manuals for Canon network camera VBC60 User Manual