65
Network security
As you will use this unit connected to a network, your attention is called to the following security
risks.
Leakage or theft of information through this unit
Use of this unit for illegal operations by persons with malicious intent
Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself
against the above network security risks.
Enable user authentication from the web screen.
Use this unit in a network secured by a firewall, etc.
If this unit is connected to a network that includes personal computers, make sure that the
system is not infected by computer viruses or other malicious entities (using a regularly
updated antivirus program, anti-spyware program, etc.).
Protect your network against unauthorized access by restricting users to those who log in with
an authorized user name and password.
After accessing the unit as an administrator, be sure to close all web browsers.
Change the administrator password periodically.
To avoid passwords that can be guessed easily by third parties, set a password of at least 8
characters in length, including at least 3 different types of characters, such as upper case,
lower case, numbers, and symbols
Restrict access to the unit by authenticating the users, for example, to prevent setting
information stored on the unit from leaking over the network.
Do not install the unit in locations where the unit, cables, and other parts can be easily
damaged or destroyed by persons with malicious intent.
Avoid connections that use public lines.
[Note]
Notes on user authentication
User authentication on the unit can performed via digest authentication or basic authentication. If
basic authentication is used without the use of a dedicated authentication device, password leaks
may occur.
We recommend using digest authentication.
Usage restrictions
Use of the same segment is recommended for the network in which the unit and personal computer
are connected.
If the equipment uses connections with different segments, events based on the settings inherent to
the network equipment, for instance, may occur so check this thoroughly prior to operation.