19
About the network security
Equipped security functions
The following security functions are featured in this camera.
q
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to "On". (
☞
pages 66 and 67)
w
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
☞
page 73)
Important:
• Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.
Note:
• When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the same IP
address (PC), access to the camera will be denied for a while.