18
About the network security of the camera
Equipped security functions
The following security functions are featured in this camera.
q Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to "On". (☞ Setup Instructions)
w Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(☞ Setup Instructions)
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.
Note:
When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the same IP
address (PC), access to the camera will be denied for a while.