Panasonic WJ-PR204 Operating Instructions - Page 10

Network security, Security between the receiver side unit and camera side unit

Page 10 highlights

1 Preface Network security As you will use this unit connected to a network, your attention is called to the following security risks. Leakage or theft of information through this unit Use of this unit for illegal operations by persons with malicious intent Interference with or stoppage of this unit by persons with malicious intent It is your responsibility to take precautions such as those described below to protect yourself against the above network security risks. • Use this unit in a network secured by a firewall, etc. • If this unit is connected to a network that includes PCs, make sure that the system is not infected by computer viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, etc.). • Protect your network against unauthorized access by restricting users to those who log in with an authorized user name and password. • Apply measures such as user authentication to protect your network against leakage or theft of information, including image data, authentication information (user names and passwords), alarm mail information, FTP server information and DDNS server information. • After the unit is accessed by the administrator, make sure to close the browser. • Change the administrator password periodically. • Do not install this unit in locations where this unit or the cables can be destroyed or damaged by persons with malicious intent. Security between the receiver side unit and camera side unit • Data sent and received between camera side unit and receiver side unit employs AES 128-bit encryption, however we cannot guarantee that data will not be intercepted by a third party. • The unit does not have a firewall feature. To prevent unauthorized external access to the network, we recommend performing the following procedures. - Setup security measures for the router and computers accessing the network. 10 Operating Instructions

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60

Network security
As you will use this unit connected to a network, your attention is called to the following
security risks.
Leakage or theft of information through this unit
Use of this unit for illegal operations by persons with malicious intent
Interference with or stoppage of this unit by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect
yourself against the above network security risks.
Use this unit in a network secured by a firewall, etc.
If this unit is connected to a network that includes PCs, make sure that the system
is not infected by computer viruses or other malicious entities (using a regularly
updated anti-virus program, anti-spyware program, etc.).
Protect your network against unauthorized access by restricting users to those who
log in with an authorized user name and password.
Apply measures such as user authentication to protect your network against leakage
or theft of information, including image data, authentication information (user names
and passwords), alarm mail information, FTP server information and DDNS server
information.
After the unit is accessed by the administrator, make sure to close the browser.
Change the administrator password periodically.
Do not install this unit in locations where this unit or the cables can be destroyed or
damaged by persons with malicious intent.
Security between the receiver side unit and camera side unit
Data sent and received between camera side unit and receiver side unit employs
AES 128-bit encryption, however we cannot guarantee that data will not be
intercepted by a third party.
The unit does not have a firewall feature. To prevent unauthorized external access
to the network, we recommend performing the following procedures.
Setup security measures for the router and computers accessing the network.
10
Operating Instructions
1 Preface