9
There are 3 sets of operating instructions for the WJ-ND200 as follows.
• Installation Guide (book, these operating instructions)
• Operating Instructions (PDF)
• Setup Instructions (PDF)
The "Installation Guide" contains descriptions of how to install/connect this unit, and descriptions of how to operate this unit
with the buttons on the front panel.
Refer to the "Setup Instructions (PDF)" for descriptions of how to perform the required settings to operate this unit using a PC
and how to connect to other devices.
Adobe
®
Reader
®
is required to read the "Operating Instruction" and "Setup Instruction" on the provided CD-ROM.
When the Adobe
®
Reader
®
is not installed on the PC, download the latest Adobe
®
Reader
®
from the Adobe web site and
install it.
"WJ-ND200" or "ND200" shown in the illustrations used in these operating instructions indicate this unit or the WJ-ND200.
• Microsoft, Windows, Internet Explorer, and ActiveX are either registered trademarks or trademarks of Microsoft Corporation
in the United States and/or other countries.
• Adobe and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States
and/or other countries.
• Other names of companies and products contained in these operating instructions may be trademarks or registered trade-
marks of their respective owners.
As you will use this product connected to a network, your attention is called to the following security risks.
1. Leakage or theft of information through this product
2. Use of this product for illegal operations by persons with malicious intent
3. Interference with or stoppage of this product by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above network
security risks.
• Use this product in a network secured by a firewall, etc.
• If this product is connected to a network that includes PCs, make sure that the system is not infected by computer
viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.).
• Protect your network against unauthorized access by restricting users to those who log in with an authorized user
name and password.
• Apply measures such as user authentication to protect your network against leakage or theft of information, including
image data, authentication information (user names and passwords), alarm mail information, FTP server information
and DDNS server information.
About these Operating Instructions
Trademarks and Registered Trademarks
Network Security