4About network security

This machine is equipped with the following security functions.
[Note:]

・Refer to the catalog specifications for the functions installed in each model.


Restricting access by user/host authentication
Setting [On] in User Authentication/Host Authentication can restrict the users accessing the cameras.
13.1 [User auth.] to configure user-authentication
13.2 [Host auth.] to configure host-authentication
Access restrictions due to HTTP port changes
You can prevent unauthorized access, such as port scanning, by changing the HTTP port number.
14.1 Networking [Network]
Encryption of Access by HTTPS Function
By using the HTTPS function, you can encrypt the access to the camera and increase the security of communication.
14.2.5 Set up HTTPS
Falsification detection
By using the falsification detection function, you can detect falsification of data recorded on the SD card.
8.3 [Alteration detection] for detecting tampering
8.4 How to set up falsification detection
SRTP communication
By using SRTP communication, the streaming data of the video data is encrypted in SSL, thus preventing peeps in the ID/PW.
14.2.9 Configure SRTP
IEEE 802.1X Network Access Control
IEEE 802.1X Network Access Controls prevent unauthorized access and eavesdropping by connecting a malicious PC to a free switching hub port in a LAN.
13.4 [IEEE 802.1X] to configure IEEE 802.1X
[Important]

・Image data, authentication information (user name, password), alarm mail information, DDNS server information, etc. may be leaked on the network. Take measures such as restricting access by user authentication or encrypting access by HTTPS.


・After the administrator has accessed the computer, be sure to close all browsers to enhance security.


・When using the SNMP feature in SNMPv1/v2, do not configure community names that you can easily guess. (e.g., public)
If you use a community name that you can guess easily, your computer's status may be leaked on the network or used as a stepping stone for unauthorized access to other devices.


[Note:]

・If you fail user authentication (authentication error) five or more times in 10 seconds from a PC with the same IP address, you will not be able to access the machine for 30 seconds.


・You can change the conditions and period when the machine becomes inaccessible.
13.6 [Security] to configure security