Panasonic WVNP1004 WVNP1004 User Guide - Page 14

About the Network Security of the Camera, Equipped security functions

Page 14 highlights

About the Network Security of the Camera Equipped security functions The following security functions are featured in this camera. q Access restrictions by the host authentication and the user authentication It is possible to restrict users from accessing the camera by setting the host authentication and/or the user authentication to on. (☞ pages 37 and 38) w Access restrictions by changing the HTTP port It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number. (☞ page 42) Note: When failed to pass the user authentication (authentication error) using the same IP address (PC) for a certain times within 5 minutes, access to the camera will be denied for a while. Important: Design and enhance security countermeasures to prevent leakage of information such as image data, authentication information (user name and password), alarm mail information, FTP server information, DDNS server information, etc. 14

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73

14
About the Network Security of the Camera
Equipped security functions
The following security functions are featured in this camera.
q
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the camera by setting the host authentication and/or the user
authentication to on. (
pages 37 and 38)
w
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
page 42)
Note:
When failed to pass the user authentication (authentication error) using the same IP address (PC) for a certain
times within 5 minutes, access to the camera will be denied for a while.
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.