12
About the network security of this unit
Equipped security functions
The following security functions are featured in this camera.
q
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to on. (
☞
pages 34 and 35)
w
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
☞
page 39)
Note:
When failed to pass the user authentication (authentication error) using the same IP address (PC) for 8 times
within 5 minutes, access to the camera will be denied for a while.
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.