Canon C50FSi VB-C50FSi User Manual - Page 63

Authorized/Restricted Host Specification

Page 63 highlights

Setting User Access Privileges (Access Control) 4 "Still Image Capture permitted to listed users only" When this option is checked, only users registered in the User List are permitted to capture still images. It is useful when distributing video as a still picture (→ P.5-24). Authorized/Restricted Host Specification 1 Basic Settings 2 3 4 5 1 "Host List" * VB-C50FSi screen In this Host List, you can in detail whether of how access from the hosts is permitted or denied. See the next page for the description format. 2 "Apply this list to HTTP server" When this is selected, the Host List is applied to the host that can access the HTTP server. In this case, control extends also to the Viewer for Java, etc. Use this when you want to restrict access not only from the viewer but also to the Web page. 3 "Apply this list to Video Transmission" Select to apply the Host List to a host who may have access to the VB-C50FSi/VB-C50Fi. Use "Apply this list to Video Transmission" if you want to restrict access from the Viewer for Java and Viewer for PC etc. 4 "Apply this list to Audio Transmission" (VB-C50FSi only)* When this is selected, the Host List is applied to the host that can receive audio. * Only displayed with a particular model (→ P.iii) 5 "Apply this list to Still Image Capture" When this is selected, the Host List is applied to the host that can capture still images. ● If you do not make a Host List, access is permitted to any hosts. ● If the Host List provided prohibits access for all hosts, the Host Restriction function Note is disabled and access is permitted to all hosts. ● To prohibit access over HTTP connection via a proxy server, the address of the proxy server should be set. ● When you set a host list which leads to prohibit yourself, restore the factory default settings. 3-21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

3-21
Basic Settings
Authorized/Restricted Host Specification
Note
If you do not make a Host List, access is permitted to any hosts.
If the Host List provided prohibits access for all hosts, the Host Restriction function
is disabled and access is permitted to all hosts.
To prohibit access over HTTP connection via a proxy server, the address of the
proxy server should be set.
When you set a host list which leads to prohibit yourself, restore the factory default
settings.
Setting User Access Privileges (Access Control)
1
“Host List”
In this Host List, you can in detail whether of how access from the hosts is permitted or denied.
See the next page for the description format.
2
“Apply this list to HTTP server”
When this is selected, the Host List is applied to the host that can access the HTTP server. In
this case, control extends also to the Viewer for Java, etc. Use this when you want to restrict
access not only from the viewer but also to the Web page.
3
“Apply this list to Video Transmission”
Select to apply the
Host List
to a host who may have access to the VB-C50FSi/VB-C50Fi. Use
“Apply this list to Video Transmission” if you want to restrict access from the Viewer for Java and
Viewer for PC etc.
4
“Apply this list to Audio Transmission” (VB-C50FSi only)*
When this is selected, the Host List is applied to the host that can receive audio.
* Only displayed with a particular model (
P.iii)
5
“Apply this list to Still Image Capture”
When this is selected, the Host List is applied to the host that can capture still images.
1
2
3
4
4
“Still Image Capture permitted to listed users only”
When this option is checked, only users registered in the User List are permitted to capture still
images.
It is useful when distributing video as a still picture (
P.5-24).
5
* VB-C50FSi screen