Panasonic WV-ST165 Operating Instructions - Page 46

About the network security, 8.1 Equipped security functions

Page 46 highlights

8 About the network security 8 About the network security 8.1 Equipped security functions The following security functions are featured in this camera. Access restrictions by the host authentication and the user authentication It is possible to restrict users from accessing the camera by setting the host authentication and/or the user authentication to "On". (®page 156, page 157) Access restrictions by changing the HTTP port It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number. (®page 169) Access encryption by the HTTPS function It is possible to enhance the network security by encrypting the access to cameras using the HTTPS function. (®page 174) IMPORTANT • Design and enhance security countermeasures to prevent leakage of information such as image data, authentication information (user name and password), alarm mail information, FTP server information, DDNS server information, etc. Perform the countermeasure such as access restriction (using the user authentication) or access encryption (using the HTTPS function). • After the camera is accessed by the administrator, make sure to close the browser for added security. • Change the administrator password periodically for added security. Note • When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the same IP address (PC), access to the camera will be denied for a while. 46 Operating Instructions

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

8
About the network security
8.1
Equipped security functions
The following security functions are featured in this camera.
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to “On”. (
®
page 156, page 157)
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
®
page 169)
Access encryption by the HTTPS function
It is possible to enhance the network security by encrypting the access to cameras using the HTTPS
function. (
®
page 174)
IMPORTANT
Design and enhance security countermeasures to prevent leakage of information such as image data,
authentication information (user name and password), alarm mail information, FTP server information,
DDNS server information, etc. Perform the countermeasure such as access restriction (using the user
authentication) or access encryption (using the HTTPS function).
After the camera is accessed by the administrator, make sure to close the browser for added security.
Change the administrator password periodically for added security.
Note
When user authentication (authentication error) has failed to pass 8 times within 30 seconds using the
same IP address (PC), access to the camera will be denied for a while.
46
Operating Instructions
8 About the network security