Axis M4218-V User Manual page 33

Hide thumbs Also See for M4218-V:
Table of Contents

Advertisement

AXIS M4218-V Dome Camera
The web interface
Prevent brute-force attacks
Blocking: Turn on to block brute-force attacks. A brute-force attack uses trial-and-error to guess login info or encryption keys.
Blocking period: Enter the number of seconds to block a brute-force attack.
Blocking conditions: Enter the number of authentication failures allowed per second before the block starts. You can set the
number of failures allowed both on page level and device level.
Firewall
Activate: Turn on the firewall.
Default Policy: Select the default state for the firewall.
• Allow: Allows all connections to the device. This option is set by default.
• Deny: Denies all connections to the device.
To make exceptions to the default policy, you can create rules that allows or denies connections to the device from specific
addresses, protocols, and ports.
• Address: Enter an address in IPv4/IPv6 or CIDR format that you want to allow or deny access to.
• Protocol: Select a protocol that you want to allow or deny access to.
• Port: Enter a port number that you want to allow or deny access to. You can add a port number between 1 and 65535.
• Policy: Select the policy of the rule.
: Click to create another rule.
Add rules: Click to add the rules that you have defined.
• Time in seconds: Set a time limit for testing the rules. The default time limit is set to 300 seconds. To activate the
rules straight away, set the time to 0 seconds.
• Confirm rules: Confirm the rules and their time limit. If you have set a time limit of more than 1 second, the rules will
be active during this time. If you have set the time to 0, the rules will be active straight away.
Pending rules: An overview of the latest tested rules that you are yet to confirm.
Note
The rules that have a time limit appears both under Pending rules and Active rules until the set time has passed, or until
you confirm them. If you don't confirm them, they appear only under Pending rules, and the firewall falls back to the
previously defined settings. If you confirm them, they will replace the current active rules.
Confirm rules: Click to activate the pending rules.
Active rules: An overview of the rules you are currently running on the device.
: Click to delete an active rule.
: Click to delete all rules, both pending and active.
Custom signed firmware certificate
33

Advertisement

Table of Contents
loading

Table of Contents