![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/0/02/002d5fac-737b-1644-31ad-81164465128f/002d5fac-737b-1644-31ad-81164465128f-bgf.png)
15
About the Network Security of This Unit
Equipped security functions
The following security functions are featured in this unit.
q Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the unit by setting the host authentication and/or the user authenti-
cation to on. (☞ pages 46 and 47)
w Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(☞ page 51)
Note:
When user authentication (authentication error) has failed to pass 8 times (6 times when clicking the [Go] button
of the browser) within 30 seconds using the same IP address (PC), access to the unit will be denied for a while.
Important:
Design and enhance security countermeasures to prevent leakage of information such as image data, authenti-
cation information (user name and password), alarm mail information, FTP server information, DDNS server
information, etc.