12

12 13

About the network security

Equipped security functions

The following security functions are featured in this camera.
q Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authenticationto"On".( Pages 38 and 39)
w Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
( Page 45)
Important:
•Designandenhancesecuritycountermeasurestopreventleakageofinformationsuchasimagedata,authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc. Perform the countermeasure such as the access restriction using the user authentication.
•Afterthecameraisaccessedbytheadministrator,makesuretoclosethebrowserforaddedsecurity.
•Changetheadministratorpasswordperiodicallyforaddedsecurity.
Note:
•Whenuserauthentication(authenticationerror)hasfailedtopass8timeswithin30secondsusingthesameIP
address (PC), access to the camera will be denied for a while.