19
About the network security

Equipped security functions

The following security functions are featured in this camera.
qAccess restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to "On". (pages 66 and 67)
wAccess restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(page 73)
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.
Note:
When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the same IP
address (PC), access to the camera will be denied for a while.