3 About the network security
3.1 Equipped security functions
The following security functions are featured in this microphone.
Access restrictions by the host authentication and the user authentication
It is possible to restrict users from accessing the microphone by setting the host authentication and/or the
user authentication to “On”. (
®
Access restrictions by changing the HTTP port
It is possible to prevent illegal access such as port scanning, etc. by changing the HTTP port number.
(
®
Access encryption by the HTTPS function
It is possible to enhance the network security by encrypting the access to the microphone using the HTTPS
function. (
®
IMPORTANT
•
Design and enhance security countermeasures to prevent leakage of information such as audio data,
authentication information (user name and password), DDNS server information, etc. Perform the
countermeasure such as access restriction (using the user authentication) or access encryption (using
the HTTPS function).
•
After the microphone is accessed by the administrator, make sure to close the browser for added
security.
•
Change the administrator password periodically for added security.
Note
•
When user authentication (authentication error) has failed 8 times within 30 seconds using the same
IP address (PC), access to the microphone will be denied for a while.
Operating Instructions
13
3 About the network security
Summary of Contents for WV-SMR10
Page 78: ...78 Operating Instructions Notes ...