Network Security - Panasonic AW-UE4 Series Operating Instructions Manual

4k integrated camera
Hide thumbs Also See for AW-UE4 Series:
Table of Contents

Advertisement

Network security

As you will use the unit connected to a network, your attention is called to the following security risks.
1) Leakage or theft of information through the unit
2) Use of the unit for illegal operations by persons with malicious intent
3) Interference with or stoppage of the unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above
network security risks.
Enable user authentication from web screen.
Use the unit in a network secured by a firewall, etc.
If the unit is connected to a network that includes personal computers, make sure that the system is not infected. By
computer viruses or other malicious entities (using a regularly updated antivirus program, anti-spyware program,
etc.)."
Protect your network against unauthorized access by restricting users to those who log in with an authorized user
name and password.
After accessing the unit as an administrator, be sure to close all web browsers.
Change the administrator password periodically.
To avoid passwords that can be guessed easily by third parties, set a password of at least 8 characters in length,
including at least 3 different types of characters, such as upper case, lower case, numbers, and symbols
Restrict access to the unit by authenticating the users, for example, to prevent setting information stored on the unit
from leaking over the network.
Do not install the camera in locations where the camera or the cables can be destroyed or damaged by persons
with malicious intent.
Avoid connections that use public lines.
[Note]
 Notes on user authentication
User authentication on the unit can performed via digest authentication or basic authentication. If basic
authentication is used without the use of a dedicated authentication device, password leaks may occur.
We recommend using digest authentication.
 Usage restrictions
Use of the same segment is recommended for the network in which the unit and personal computer are connected.
If the equipment uses connections with different segments, events based on the settings inherent to the network
equipment, for instance, may occur so check this thoroughly prior to operation.
9

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents