3 About the network security
3.1 Equipped security functions
The following security functions are featured in this camera.
Access restrictions by the user authentication
It is possible to restrict users from accessing the camera by setting the user authentication to "On".
(®page 33)
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(®page 36)
IMPORTANT
•
Design and enhance security countermeasures to prevent leakage of information such as image data,
authentication information (user name and password), etc. Perform the countermeasure such as
access restriction using the user authentication.
•
After the camera is accessed by the administrator, make sure to close the browser for added security.
•
Change the administrator password periodically for added security.
Note
•
When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the
same IP address (PC), access to the camera will be denied for a while.
3 About the network security
Operating Instructions
13