Panasonic WJ-NV300 Operating Instructions - Page 143

Network security of the recorder, The security function of the recorder, Enhance network security

Page 143 highlights

Network security of the recorder The security function of the recorder q Access restriction by the user authentication It is possible to restrict users to access the recorder by selecting "On" for "User authentication". (☞ Page 59) w Access restriction by changing the HTTP port number By changing the HTTP port number, it is possible to prevent illegal access such as a port scanning, etc. (☞ page 54) Important: • Design and enhance security countermeasures to prevent leakage of information such as image data, authentication information (user name and password), alarm mail information, FTP server information, etc. Perform the countermeasure such as the access restriction using the user. • After the unit is accessed by the administrator, make sure to close the web browser for added security. • Change the administrator password periodically for added security. Enhance network security It is possible to enhance the network security by dividing the subnet using a router to authenticate users twice (by the recorder and by the router). When connecting the recorder to an unsecured network, secure the network connection by installing a VPN (Virtual Private Network) device, etc. between the recorder and the host PC. Important: • The settings for the network security vary depending on the network to which the recorder is to be con- nected such as an intranet or Internet service provider. Refer to a network administrator for further information about the network security. [Connection example] IP address: 192.168.1.1 Subnet mask: 255.255.255.0 Router Network Router IP address: 192.168.0.1 Subnet mask: 255.255.255.0 IP address: 192.168.1.100 Subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 COPY MOUSE Recorder IP address: 192.168.0.250 Subnet mask: 255.255.255.0 Default gateway: 192.168.0.1 PC By using a firewall, etc., it is possible to use packet filtering and protocol filtering to enhance the network security. 143

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189

143
The security function of the recorder
q
Access restriction by the user authentication
It is possible to restrict users to access the recorder by selecting "On" for "User authentication". (
Page 59)
w
Access restriction by changing the HTTP port number
By changing the HTTP port number, it is possible to prevent illegal access such as a port scanning, etc.
(
page 54)
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data,
authentication information (user name and password), alarm mail information, FTP server information, etc.
Perform the countermeasure such as the access restriction using the user.
After the unit is accessed by the administrator, make sure to close the web browser for added security.
Change the administrator password periodically for added security.
Enhance network security
It is possible to enhance the network security by dividing the subnet using a router to authenticate users twice
(by the recorder and by the router). When connecting the recorder to an unsecured network, secure the net-
work connection by installing a VPN (Virtual Private Network) device, etc. between the recorder and the host
PC.
Important:
The settings for the network security vary depending on the network to which the recorder is to be con-
nected such as an intranet or Internet service provider. Refer to a network administrator for further informa-
tion about the network security.
[Connection example]
By using a firewall, etc., it is possible to use packet filtering and protocol filtering to enhance the network secu-
rity.
MOUSE
COPY
IP address: 192.168.1.1
Subnet mask: 255.255.255.0
IP address: 192.168.0.1
Subnet mask: 255.255.255.0
IP address: 192.168.1.100
Subnet mask: 255.255.255.0
Default gateway: 192.168.1.1
IP address: 192.168.0.250
Subnet mask: 255.255.255.0
Default gateway: 192.168.0.1
Router
Recorder
Router
PC
Network
Network security of the recorder