19
About the network security of the camera
Equipped security functions
The following security functions are featured in this camera.
q
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to "ON". (
☞
pages 63 and 64)
w
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
☞
page 68)
Note:
When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the same IP
address (PC), access to the camera will be denied for a while.
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.