Panasonic AW-360B10 Operating Instructions Manual page 12

360-degree live camera base unit
Table of Contents

Advertisement

∫ Network security
As you will use the unit connected to a network, your attention is called to the following security risks.
1
Leakage or theft of information through the unit
2
Use of the unit for illegal operations by persons with malicious intent
3
Interference with or stoppage of the unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above
network security risks.
≥ Use the unit in a network secured by a firewall, etc.
≥ If the unit is connected to a network that includes personal computers, make sure that the system is not infected by
computer viruses or other malicious entities (using a regularly updated antivirus program, anti-spyware program,
etc.).
≥ Protect your network against unauthorized access by setting up user authentication to restrict users to those who
log in with an authorized user name and password. In addition, to prevent third parties from identifying user name
information (including passwords), change the information from the factory default.
For details, refer to "User authentication" on page 26.
≥ After accessing the unit, be sure to close all web browsers.
≥ Store authentication information (user names and passwords) appropriately so that no third parties will be able to
access it.
≥ Change the password periodically.
≥ Restrict access to the unit by authenticating the users, for example, to prevent setting information stored on the unit
from leaking over the network.
≥ Do not install the camera in locations where the camera or the cables can be destroyed or damaged by persons with
malicious intent.
≥ Concerning user authorization
User authentication on the unit can be performed via basic authentication. If basic authentication is used without using
a dedicated line equipped with an authentication function, password leaks may occur.
≥ Usage restrictions
Use of the same segment is recommended for the network in which the unit and the personal computer are
connected.
If the equipment uses connections with different segments, events based on the settings inherent to the network
equipment, for instance, may occur so check this thoroughly prior to operation.
12

Advertisement

Table of Contents
loading

Table of Contents