![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/1/5a/15a2dbcd-9721-4918-94c8-d23ceaef31fc/15a2dbcd-9721-4918-94c8-d23ceaef31fc-bgc.png)
12
About the network security
Equipped security functions
The following security functions are featured in this camera.
q Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authenticationto"On".(☞ Pages 38 and 39)
w Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(☞ Page 45)
Important:
•Designandenhancesecuritycountermeasurestopreventleakageofinformationsuchasimagedata,authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc. Perform the countermeasure such as the access restriction using the user authentication.
•Afterthecameraisaccessedbytheadministrator,makesuretoclosethebrowserforaddedsecurity.
•Changetheadministratorpasswordperiodicallyforaddedsecurity.
Note:
•Whenuserauthentication(authenticationerror)hasfailedtopass8timeswithin30secondsusingthesameIP
address (PC), access to the camera will be denied for a while.