|
| ||||
① Restricting access by user/host authentication Setting [On] in User Authentication/Host Authentication can restrict the users accessing the cameras. →15.1 [User auth.] to configure user-authentication →15.2 [Host auth.] to configure host-authentication ② Access restrictions due to HTTP port changes You can prevent unauthorized access, such as port scanning, by changing the HTTP port number. →16.1 Networking [Network] ③ Encryption of Access by HTTPS Function By using the HTTPS function, you can encrypt the access to the camera and increase the security of communication. →16.2.5 Set up HTTPS ④ Falsification detection By using the falsification detection function, you can detect falsification of data recorded on the SD card. →9.3 [Alteration detection] for detecting tampering →9.4 How to set up falsification detection ⑤ SRTP communication By using SRTP communication, the streaming data of the video data is encrypted in SSL, thus preventing peeps in the ID/PW. →16.2.9 Configure SRTP ⑥ IEEE 802.1X Network Access Control IEEE 802.1X Network Access Controls prevent unauthorized access and eavesdropping by connecting a malicious PC to a free switching hub port in a LAN. →15.4 [IEEE 802.1X] to configure IEEE 802.1X |
| ||||
| ||||