To ensure that the login procedure is performed as securely as possible when using
SMTP authentication, you must define the weakest authentication method allowed.
e Weakest method allowed to the highest/safest method
in
ver
il) Test
-
Receiver:
Enter an email address and click the Test button to test that the mail servers are
e
ages
can be se
-
-
-
the
to
P control and data connections to the target server. This is
and the target FTP server.
- Login
Method:
Set th
supported by the mail server. The most secure method is listed in the drop-down list:
Login / Pla
• SMTP(E-Mail) Recei
-
Receiver:
Enter an email address. You can also register the e-mail address of recipients up
to
8.
• SMTP(E-Ma
functioning and that the email address is valid.
FTP & JPEG
When th network camera detects an event, it can record and saves images to an FTP server. Im
nt as e-mail attachments. Check the box to enable the service.
• FTP
Setting
Serve
r:
Enter the server's IP address or host name. Note that a DNS server must be
specified in the TCP/IP network settings if using a host name.
Port:
Enter the port number used by the FTP server. The default is 21.
Use passive mode:
Under normal circumstances the Network Camera simply requests
target FTP server to open the data connection. Checking this box issues a PASV command
the FTP server and establishes a passive FTP connection; whereby the Network Camera
actively initiates both the FT
normally desirable if there is a firewall between the camera
38