14
About the Network Security of the Camera
Equipped security functions
The following security functions are featured in this camera.
q
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to on. (
☞
pages 37 and 38)
w
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
☞
page 42)
Note:
When failed to pass the user authentication (authentication error) using the same IP address (PC) for a certain
times within 5 minutes, access to the camera will be denied for a while.
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.