About the Network Security of This Unit
Equipped security functions
The following security functions are featured in this unit.
qAccess restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the unit by setting the host authentication and/or the user authenti- cation to on. (☞ pages 46 and 47)
wAccess restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number. (☞ page 51)
Note:
When user authentication (authentication error) has failed to pass 8 times (6 times when clicking the [Go] button of the browser) within 30 seconds using the same IP address (PC), access to the unit will be denied for a while.
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti- cation information (user name and password), alarm mail information, FTP server information, DDNS server information, etc.
15