ACCESS AUTHORIZATION
■Control of Access
Authorization
User access authorization is controlled as follows.
●Unlimited access
If neither user nor host authorization is used (set to OFF) in a network, all users may perform the following operations at access level 2.
•Controlling cameras and other equipment connect- ed to the
•Monitoring live images
•Monitoring alarm images and querying the log files
•Accessing the data stored in the
*Accessing the ADMINISTRATOR SETUP PAGE of the
●Limited access
•Access is limited according to the host access levels specified in the HOST SETUP window. The HOST SETUP window is queried using the IP address of the host requesting access to the
•When access is made from a PC not registered in the HOST SETUP window, the dialog box shown below prompts the user to enter User Name and Password. The access level is determined when both the user name and password are entered.
■Access Level
Four access levels can be assigned to control access by users.
More than one user can be assigned the same access level. While device control commands are given top priority in the execution chain, there is no priority attached to the access level. It is possible to designate more than one network administrator and to change designated administrators.
●Administrator (Level 1)
•Access to and setup of ADMINISTRATOR SETUP PAGE
•Rewriting data stored in the
•Controlling cameras and other equipment connect- ed to the
•Monitoring live images
•Monitoring alarm images and querying the log files
•Accessing the data stored in the
●Input Select and operation (Level 2)
•Controlling cameras and other equipment connect- ed to the
•Monitoring live images
•Monitoring alarm images and querying the log files
•Accessing the data stored in the
●Monitoring only (Level 3)
•Monitoring live image.
•Monitoring alarm images and querying the log files
•Accessing the data stored in the
●Unauthorized level (Level 4)
•Access to the
57