|
|
① Restricting access by user/host authentication Setting [On] in User Authentication/Host Authentication can restrict the users accessing the cameras. →13.1 [User auth.] to configure user-authentication →13.2 [Host auth.] to configure host-authentication ② Access restrictions due to HTTP port changes You can prevent unauthorized access, such as port scanning, by changing the HTTP port number. →14.1 Networking [Network] ③ Encryption of Access by HTTPS Function By using the HTTPS function, you can encrypt the access to the camera and increase the security of communication. →14.2.5 Set up HTTPS ④ Falsification detection By using the falsification detection function, you can detect falsification of data recorded on the SD card. →8.3 [Alteration detection] for detecting tampering →8.4 How to set up falsification detection ⑤ SRTP communication By using SRTP communication, the streaming data of the video data is encrypted in SSL, thus preventing peeps in the ID/PW. →14.2.9 Configure SRTP ⑥ IEEE 802.1X Network Access Control IEEE 802.1X Network Access Controls prevent unauthorized access and eavesdropping by connecting a malicious PC to a free switching hub port in a LAN. →13.4 [IEEE 802.1X] to configure IEEE 802.1X |
|
|