21
About the network security
Equipped security functions
The following security functions are featured in this camera.
q
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to "On". (
☞
Pages 72 and 73)
w
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
☞
Page 79)
Important:
• Design and enhance security countermeasures to prevent leakage of information such as image data, authenti
-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc. Perform the countermeasure such as the access restriction using the user authentication.
• After the unit is accessed by the administrator, make sure to close the browser for added security.
• Change the administrator password periodically for added security.
Note:
• When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the same IP
address (PC), access to the camera will be denied for a while.