Operating Instructions
IMPORTANT
• Failure to provide the required personal computer environment
may slow down the delineation of the images on the screen, make
it impossible for the web browser to work and cause other kinds of
problems.
<NOTE>
• Depending on the software version of the unit, an update may be
necessary.
•
Use the desktop version of Internet Explorer. (Internet Explorer for
Windows UI is not supported.)
• For the latest information on compatible operating systems and web
browsers, visit the support desk at the following website.
http://pro-av.panasonic.net/
Disclaimer of warranty
IN NO EVENT SHALL Panasonic Corporation BE LIABLE TO ANY
PARTY OR ANY PERSON, EXCEPT FOR REPLACEMENT OR
REASONABLE MAINTENANCE OF THE PRODUCT, FOR THE
CASES, INCLUDING BUT NOT LIMITED TO BELOW:
A
ANY DAMAGE AND LOSS, INCLUDING WITHOUT LIMITATION,
DIRECT OR INDIRECT, SPECIAL, CONSEQUENTIAL OR
EXEMPLARY, ARISING OUT OF OR RELATING TO THE
PRODUCT;
B
PERSONAL INJURY OR ANY DAMAGE CAUSED BY
INAPPROPRIATE USE OR NEGLIGENT OPERATION OF THE
USER;
C
UNAUTHORIZED DISASSEMBLE, REPAIR OR MODIFICATION
OF THE PRODUCT BY THE USER;
D
INCONVENIENCE OR ANY LOSS ARISING WHEN IMAGES
ARE NOT DISPLAYED, DUE TO ANY REASON OR CAUSE
INCLUDING ANY FAILURE OR PROBLEM OF THE PRODUCT;
E
ANY PROBLEM, CONSEQUENTIAL INCONVENIENCE,
OR LOSS OR DAMAGE, ARISING OUT OF THE SYSTEM
COMBINED BY THE DEVICES OF THIRD PARTY;
F
ANY DEMANDS FOR COMPENSATION, CLAIMS, ETC.
OCCASIONED BY THE INFRINGEMENT OF PRIVACY BY
INDIVIDUALS OR ORGANIZATIONS WHOSE IMAGES WERE
SHOT BY THE USER BECAUSE THESE IMAGES (INCLUDING
THE RECORDINGS MADE) WERE MADE AVAILABLE BY THE
USER BECAUSE IN THE PUBLIC DOMAIN FOR SOME REASON
OR OTHER OR BECAUSE THE IMAGES ENDED UP BEING
USED FOR PURPOSES OTHER THAN THE ONE DESCRIBED
ABOVE;
G
LOSS OF REGISTERED DATA CAUSED BY ANY FAILURE.
Network security
As the unit intended to be used while connected to a network, the
following security risks exist.
A
Leakage or theft of information through the unit
B
Unauthorized operation of the unit by persons with malicious intent
C
Interference with or stoppage of the unit by persons with malicious
intent
It is your responsibility to take precautions, such as those described
below, to protect yourself against the above network security risks.
•
Use the unit in a network secured by a firewall, etc.
• If the unit is connected to a network that includes personal computers,
make sure that the system is not infected by computer viruses or other
malicious programs (using a regularly updated antivirus program, anti-
spyware program, etc.).
•
Protect your network against unauthorized access by restricting users
to those who log in with an authorized user name and password.
• After accessing the unit as an administrator, be sure to close all web
browsers.
•
Change the administrator password periodically.
• Restrict access to the unit by authenticating the users, for example,
to prevent setting information stored on the unit from leaking over the
network.
• Do not install the unit in locations where the unit, cables, and other
parts can be easily damaged or destroyed by persons with malicious
intent.
•
Avoid connections that use public lines.
<NOTE>
Notes on user authentication
• User authentication on the unit can performed via digest authentication
or basic authentication. If basic authentication is used without the use
of a dedicated authentication device, password leaks may occur.
We recommend using digest authentication or host authentication.
Usage restrictions
• We recommend connecting the unit, controller, and any computers to
the same network segment.
Events based on settings inherent to the network devices, for example,
may occur in connections that include different segments, so be sure
to perform checks prior to operation.
28
29
Before use (continued)