Canon Vb-C60 NETWORK CAMERA VB-C60 Operation Guide - Page 58

Setting User Access Privileges Access Control, Host List, Apply the list to HTTP Server

Page 58 highlights

Setting User Access Privileges (Access Control) Note z If no host list is available, access is permitted to all hosts. z If a host list is given that indicates prohibition of all accesses, the host restriction function is disabled and access is permitted to all hosts. z To prohibit access via a proxy server in HTTP connection, a proxy server address must be set. z If Host Access Restriction is set wrongly, access to the setting pages itself may be prohibited, in which case restoring the factory settings will become the only means for recovery. z If host access control is implemented, this camera cannot be accessed by IPv6. z If the [Host List] or [Apply the list to HTTP Server] setting is changed, the camera may become no longer accessible from the active browser. Check beforehand the precautions explained in "Notes" in "Setting the Items Requiring Rebooting (Reboot Item)" ( P. 1-49). Tip The Host Access Restriction function restricts the hosts on which the viewer and other client applications are running, where access is restricted using a list containing one or more entries in the following format. Listing Format [!] addr [ -addr2 ] z "addr" conforms to the standard IP address format. z The addresses "addr" and "addr2" give the IP address range, and if IP address A is between addr and addr2, A is included in the range of addr to addr2. It is possible to omit addr2, in which case the value of addr2 becomes the same as that of addr. z If the entry starts with "!," access is prohibited. If "!" does not precede the entry, access is permitted. z If a given host address corresponds to multiple entries, whether access is permitted or prohibited is determined by the setting of the first applicable entry after the beginning of the host list. Accordingly, take note that in Examples 3 to 5 below, an entry of permitted address must be specified in an entry of prohibited address. z Redundant and conflicting entries in the list are automatically deleted from the list. z If the host address does not belong to any entry, access is permitted. 1-42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198

1-42
Setting User Access Privileges (Access Control)
Note
If no host list is available, access is permitted to all hosts.
If a host list is given that indicates prohibition of all accesses, the host restriction function is
disabled and access is permitted to all hosts.
To prohibit access via a proxy server in HTTP connection, a proxy server address must be
set.
If Host Access Restriction is set wrongly, access to the setting pages itself may be
prohibited, in which case restoring the factory settings will become the only means for
recovery.
If host access control is implemented, this camera cannot be accessed by IPv6.
If the [
Host List
] or [
Apply the list to HTTP Server
] setting is changed, the camera may
become no longer accessible from the active browser. Check beforehand the precautions
explained in "Notes" in "Setting the Items Requiring Rebooting (Reboot Item)" (
±
P. 1-49).
Tip
The Host Access Restriction function restricts the hosts on which the viewer and other client
applications are running, where access is restricted using a list containing one or more
entries in the following format.
Listing Format
[!] addr [ -addr2 ]
"addr" conforms to the standard IP address format.
The addresses "addr" and "addr2" give the IP address range, and if IP address A is
between addr and addr2, A is included in the range of addr to addr2. It is possible to
omit addr2, in which case the value of addr2 becomes the same as that of addr.
If the entry starts with "!," access is prohibited. If "!" does not precede the entry,
access is permitted.
If a given host address corresponds to multiple entries, whether access is permitted
or prohibited is determined by the setting of the first applicable entry after the
beginning of the host list. Accordingly, take note that in Examples 3 to 5 below, an
entry of permitted address must be specified in an entry of prohibited address.
Redundant and conflicting entries in the list are automatically deleted from the list.
If the host address does not belong to any entry, access is permitted.