Canon Vb-C60 NETWORK CAMERA VB-C60 Operation Guide - Page 58
Setting User Access Privileges Access Control, Host List, Apply the list to HTTP Server
UPC - 013803118063
View all Canon Vb-C60 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 58 highlights
Setting User Access Privileges (Access Control) Note z If no host list is available, access is permitted to all hosts. z If a host list is given that indicates prohibition of all accesses, the host restriction function is disabled and access is permitted to all hosts. z To prohibit access via a proxy server in HTTP connection, a proxy server address must be set. z If Host Access Restriction is set wrongly, access to the setting pages itself may be prohibited, in which case restoring the factory settings will become the only means for recovery. z If host access control is implemented, this camera cannot be accessed by IPv6. z If the [Host List] or [Apply the list to HTTP Server] setting is changed, the camera may become no longer accessible from the active browser. Check beforehand the precautions explained in "Notes" in "Setting the Items Requiring Rebooting (Reboot Item)" ( P. 1-49). Tip The Host Access Restriction function restricts the hosts on which the viewer and other client applications are running, where access is restricted using a list containing one or more entries in the following format. Listing Format [!] addr [ -addr2 ] z "addr" conforms to the standard IP address format. z The addresses "addr" and "addr2" give the IP address range, and if IP address A is between addr and addr2, A is included in the range of addr to addr2. It is possible to omit addr2, in which case the value of addr2 becomes the same as that of addr. z If the entry starts with "!," access is prohibited. If "!" does not precede the entry, access is permitted. z If a given host address corresponds to multiple entries, whether access is permitted or prohibited is determined by the setting of the first applicable entry after the beginning of the host list. Accordingly, take note that in Examples 3 to 5 below, an entry of permitted address must be specified in an entry of prohibited address. z Redundant and conflicting entries in the list are automatically deleted from the list. z If the host address does not belong to any entry, access is permitted. 1-42