8 About the network security8.1 Equipped security functionsThe following security functions are featured in this camera.Access restrictions by the host authentication and the user authenticationIt is possible to restrict users from accessing the camera by setting the host authentication and/or the userauthentication to “On”. (®page 157, page 158)Access restrictions by changing the HTTP portIt is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.(®page 170)Access encryption by the HTTPS functionIt is possible to enhance the network security by encrypting the access to cameras using the HTTPSfunction. (®page 175)IMPORTANT• Design and enhance security countermeasures to prevent leakage of information such as image data,authentication information (user name and password), alarm E-mail information, FTP serverinformation, DDNS server information, etc. Perform the countermeasure such as access restriction(using the user authentication) or access encryption (using the HTTPS function).• After the camera is accessed by the administrator, make sure to close all the browsers for addedsecurity.• Change the administrator password periodically for added security.Note• When user authentication (authentication error) has failed 8 times within 30 seconds using the sameIP address (PC), access to the camera will be denied for a while.Operating Instructions 478 About the network security