Network Security
Security functions provided on the
camera
This camera is provided with the following security functions.
1.
User authentication/host authentication access restrictions (authentication setup page)
When "ON" is set for the user authentication/host authentication settings, users and PCs allowed to
access the camera and the PC are restricted. (→ page 46)
2.
Access restrictions based on changes to the HTTP port (network setup page)
Illegal access is prevented by changing the HTTP port No. (→ page 52)
.........................................................................................................................................................................
Note
• This camera can no longer be accessed if user authentication fails (authentication error) from a PC with
the same IP address 8 times or more in 30 seconds. Wait for a while before retrying to access the
camera.
..............................................................................................................................................................................
Important
• Since there is a risk that image data, authentication information (user names and passwords), alarm mail
information, FTP server information, DDNS server information and other information will leak onto the
network, adopt measures such as restricting access by user authentication.
65