
About the Network Security of the Camera
Equipped security functions
The following security functions are featured in this camera.
qAccess restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user authentication to on. (☞ pages 35 and 36)
wAccess restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number. (☞ page 40)
Note:
When failed to pass the user authentication (authentication error) using the same IP address (PC) for a certain times within 5 minutes, access to the camera will be denied for a while.
14