Home > Panasonic > Camera Accessories > Panasonic Network Camera Management System Bbhgw700a Operating Instructions

Panasonic Network Camera Management System Bbhgw700a Operating Instructions

    Download as PDF Print this page Share this page

    Have a look at the manual Panasonic Network Camera Management System Bbhgw700a Operating Instructions online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 10737 Panasonic manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							61 [For assistance, please call: 1-800-272-7033]Operating Instructions
    Functions
    How to Modify/Delete Entries
    1.Click Port Forwarding on the Address 
    Translation page
    .
    2.Select the No. you want to modify or delete in 
    port forwarding, and click Modify/Delete under 
    the 
    operation heading.
     The port forwarding registration page is 
    displayed.
    3.When you want to modify the settings, click 
    [Modify], when you want to delete the settings, 
    click [Delete]
    .
     The port forwarding page is displayed.
     After modification, the modified information 
    field will be highlighted in orange and the 
    settings will have changed.
     After deletion, the deleted information field 
    will be highlighted in orange and Unsaved 
    Deletion is displayed.
    4.Click [Save].
     The restart window indicating that setup is 
    complete is displayed.
    5.Click [Restart]. 
    						
    							Operating Instructions
    62
    The DMZ Function
    The DMZ (De-militarized Zone) function allows destination unknown packets sent from the WAN 
    (Internet) side to the LAN (Home) side, to be forwarded to an IP address specified in the DMZ 
    functions settings. Packets sent by the DMZ function are forwarded to the registered IP address after 
    being passed through all the security filters.
    DMZ Function 
    1.Click Port Forwarding on the Address 
    Translation
     page.
    2.Select Enable from the drop-down list in Entry, 
    and enter the forwarding destination IP 
    address into the DMZ functions Host IP 
    Address field
    .
    Notes
     The IP address registered at the forwarding destination should be the same as the IP 
    address on the LAN.
     The DMZ function on this product can forward data to an IP address of a device connected 
    to the LAN (Home) side using port forwarding. The IP address filters registered at the 
    forwarding destination are disabled. The DMZ function of this product does not split the 
    network into segments. Therefore, in the unlikely event that the forwarding destination IP 
    address is attacked, there is a chance that other devices connected to the LAN side have 
    also been attacked. Bear this in mind when using this system and take safety precautions.
     When using the DMZ function, set Address Translation to Enable. (see page 57)
     The DMZ function is not compatible with the Camera Portal (No.TCP80[Default]), Setup 
    (No.TCP8080[Default]), and the PPTP server function (No.1723[GRE]). Also, when IPv6 
    Tunneling Connection or IPv6 6to4 Connection is being used, the IPv6 protocol (Protocol 
    No. 41) is not compatible with the DMZ function.
    3.When setup is complete, click [Save].
     The entered information is saved.
    Note
    When saving, do not cut the power supply. If cut, saving might not be completed successfully.
    4.When [Restart] is displayed on the setup page, 
    click it
    . 
    						
    							63 [For assistance, please call: 1-800-272-7033]Operating Instructions
    Functions
    3.2.2 Improving Security
    This function allows you to limit access to this product and set up filtering easily. When performing 
    security setup, a filtering log is saved in the default settings. The saved log is displayed as a three-
    character abbreviation. (see page 
    64) 
    						
    							Operating Instructions
    64
    Data Entry Field
    Easy Security SettingsIt is possible to easily set up firewalls, which appear frequently, and 
    are very important in terms of security. The default settings are 
    oriented to the highest possible level. Only change them if essential.
     Access by private IP 
    addresses are 
    rejected in both 
    directions.Display when saving log: P-P
    When the source of an incoming (from WAN side) and destination of 
    an outgoing (to WAN side) packet is a private address, access to this 
    product is prohibited. In factory default settings Access by private IP 
    addresses are rejected in both directions and Log Output are both 
    checked.
     Access by NetBIOS/
    File sharing/Printer 
    sharing/PC remote 
    access are rejected in 
    both directions.Display when saving log: SHR
    Prohibits the access in both ways of packets sent/received when files 
    or printers are shared on Windows. In factory default settings Access 
    by NetBIOS/File sharing/Printer sharing/PC remote access are 
    rejected in both directions and Log Output are both checked.
    Access Control
     Setup pages
    Settings to limit access to this product from the WAN side.
    Display when saving log: W-C
    It is possible to select either Administrator Only or Restricted Access  
    for access to Setup from the WAN side. In factory default settings 
    Restricted Access and Log Output are both checked.
     Camera PortalDisplay when saving log: W-P
    It is possible to select either None, Administrator Only or Restricted 
    Access for access to Camera Portal from the WAN side. In factory 
    default settings None and Log Output are both checked.
    Stealth Mode
     Stealth Mode can 
    hide this product from 
    WAN (Internet).
    Display when saving log: STL
    It is possible to set this product to not respond to Pings etc. from the 
    WAN (Internet) side. Therefore it can escape the attackers existence 
    verification produced by Pings etc. It will also not respond to UDP/
    TCP port scans. In factory default settings Stealth Mode can hide 
    this product from WAN (Internet) and Log Output are both checked.
     Regard Ident packet 
    as an exceptionDisplay when saving log: STL (Ident)
    When clients try to send/receive E-mail, There is E-mail server that 
    authenticates E-mails to/from clients. This authentication uses 
    recognition protocol, which uses TCP port number 113. The 
    authentication level is relatively low so there are not many cases 
    where clients are unable to send/receive E-mails. In factory default 
    settings Regard the Ident Packet as an Exception and Log Output 
    are both checked.
    Intrusion DetectionWhen using the intrusion detection function, check the field under 
    each heading.
     Stateful packet 
    inspection (Dynamic 
    packet filtering) is 
    enabledDisplay when saving log: SPI
    If a packet being received from the WAN side is inspected, and 
    judged to be a corrupt packet, it is intercepted. By comparing the 
    packet to static filtering (packet filtering through header information), 
    Internet data can be sent more safely. In factory default settings  
    Stateful packet inspection (Dynamic packet filtering) is enabled and 
    Log Output are both checked. 
    						
    							65 [For assistance, please call: 1-800-272-7033]Operating Instructions
    Functions
    Notes
     If the log output heading is unchecked, a log will not be recorded.
     In order to improve security, it is necessary to manage your current software and update firmware 
    as appropriate.
    Priority of Security Functions
    In order for this product to combat various types of illegal access from the Internet, it is equipped with 
    the following security functions:
    [Prioritization (top to bottom)]
     Packet Filtering (see page 66)
     Easy Security Settings (see page 63)
     Stealth Mode (see page 64)
    These functions are executed in the above order. At each level the packet is either passed or 
    intercepted.
    Note
    When using the DMZ function (see page 62), the security function cannot be executed for DMZ 
    terminal packets.
     Attack Detection is 
    enabledDisplay when saving log: DoS
    Harmful data from the WAN side is detected, and the packet is 
    intercepted. A detection record is noted in the log.
    The following types of attacks can be detected:
    TCP Scan
    UDP Scan
     ICMP Echo 
    						
    							Operating Instructions
    66
    Packet Filtering
    By specifying the IP address, port and protocol parameters, it is possible to either pass or intercept IP 
    packets that are being received. If the parameters are set effectively they can be used as a security 
    measure. Filtering is processed from the smallest entry no. up. For an explanation of each heading in 
    filtering, see below.
    Notes
     You must click [Save] after setting the filtering parameters.
    Data Entry Field
    1.Click [Packet Filtering] on the security setup 
    page
    .
    2.Click Add under the Operation heading.
    3.Set the necessary headings and click [Add].
    4.When setup is complete, click [Save].
     The entered information is saved.
    5.When [Restart] is displayed on the setup page, 
    click it
    .
    No.Select an entry no. between 1 and 64. Packet filtering is processed from the 
    smallest entry no. up. If an entry is already registered, it will be overwritten 
    by the new entry.
    OperationClick Add to add a new filtering setting. To modify or delete a filtering setting 
    click Modify/Delete. The setup page will open and you can add, modify or 
    delete settings by entering the data and clicking the appropriate button.
    EntryEnable or Disable this entry. 
    						
    							67 [For assistance, please call: 1-800-272-7033]Operating Instructions
    Functions
    Ty p eSelect Permit (if it conforms to the parameters it will be passed) or Prohibit 
    (if it conforms to the parameters it will be intercepted).
    DirectionSelect W  L (filtering when receiving from WAN) or L  W (filtering when 
    sending to WAN).
    Source IP 
    Address/Prefix 
    LengthSet the packet source IP address to be filtered.
     When specifying only 1 IP address, enter the IP address and its subnet 
    prefix length.
     When specifying an IP address range, enter the network address in the 
    IP address field, and the network prefix number in the prefix length field. 
    For example, when specifying an network address of 192.168.0.0/16, 
    enter 192.168.0.0 in the IP address field, and 16 in the prefix length 
    field.
    If  is entered in the IP address field, all packets are filtered.
    Note
    When specifying an IP address range, even if this products IP address 
    is included in the range, this product will not be filtered. When you want 
    to filter this product, it is necessary to enter   or the code for this 
    product (local) in the IP address data field.
    Source Port
    Set the packet source port to be filtered.
     When using only 1 port, enter the port number.
     When entering a range, enter - in between the numbers. For example, 
    when you want to use port numbers 2000 to 3000, enter 2000-3000. 
    The number on the left should be lower than the number on the right.
    If  is entered, all packets are filtered.
    Destination IP 
    Address/Prefix 
    LengthSet the packet destination IP address to be filtered. Entry is the same as for 
    the source IP address.
    When you want to specify this product, enter local.
    Destination PortSet the packet destination port number to be filtered. Entry is the same as 
    for the Source Port.
    ProtocolSelect a protocol to be used when sending/receiving data. It is possible to 
    select from TCP, UDP, TCP & UDP, ICMP, ESP, GRE and 
    .  selects 
    all the protocols.
    Log OutputSet whether to display the temporarily saved packet information on the 
    [Filtering Log]. 
    						
    							Operating Instructions
    68
    Modifying or Deleting Filtering Headings
    1.Click Packet Filtering on the security setup page.
    2.Click Modify/Delete under the operation heading of the filter you want to modify or delete from 
    the filtering parameters list
    .
    3.Click [Modify] to modify, or [Delete] to delete the selected heading.
    4.When setup is complete, click [Save].
     The entered information is saved.
    5.When [Restart] is displayed on the setup page, click it.
    Changing the Priority of Filtering Headings
    Packet filtering is processed starting from the smallest entry no. To change the priority of filtering 
    headings, on Change of Priority on the filtering setup page, enter the heading entry no. you want to 
    move in the left data field, the destination entry no. in the right data field, and click [Move]. Then, click 
    [Save] and when [Restart] is displayed on the setup page, click it. 
    						
    							69 [For assistance, please call: 1-800-272-7033]Operating Instructions
    Functions
    3.2.3 Improving IPv6 Security
    This function allows you to limit IPv6 connection access to this product and set up filtering easily. In 
    Factory Default Settings, a filtering log is saved when security setup is performed. The saved log is 
    displayed as a three-character abbreviation. (see below)
    Data Entry Field
    IPv6 Easy Security 
    SettingsIt is possible to easily set up firewalls, which appear frequently, and 
    are very important in terms of security. The default settings are 
    oriented to the highest possible level. Only change them if essential.
     Access by Direct 
    Hosting of SMB is 
    rejected in both 
    directions.Display when saving log: SHR
    Rejects access in both directions by Direct Hosting of SMB. In 
    factory default settings Access by Direct Hosting of SMB is rejected 
    in both directions and Log Output are both checked.
     Access by port used 
    by RPC is rejected in 
    both directions.Display when saving log: SHR
    Rejects access in both directions by the port used by RPC. In factory 
    default settings Access by port used by RPC is rejected in both 
    directions and Log Output are both checked. 
    						
    							Operating Instructions
    70
    Notes
     If the log output heading is unchecked, a log will not be recorded.
     In order to improve security, it is necessary to manage your current software and update firmware 
    as appropriate.
     Communication using 
    global addresses 
    other than the 
    allocated global 
    address is forbidden.Display when saving log: GOR
    Prohibits communication using global addresses other than the 
    allocated global address. The allocated global address contains an 
    IPv6 side WAN address, and IPv6 addresses which have a LAN side 
    prefix/prefix length. In factory default settings Communication using 
    global addresses other than the allocated global address is 
    forbidden and Log Output are both checked.
    IPv6 Stealth Mode
     Stealth Mode can 
    hide this product from 
    WAN (Internet) side 
    IPv6 network.
    Display when saving log: STL
    It is possible to set this product to not respond to IPv6 Pings etc. 
    from the WAN (Internet) side. Therefore it can escape the attackers 
    existence verification produced by IPv6 Pings etc. It will also not 
    respond to UDP/TCP port scans. In factory default settings Stealth 
    Mode can hide this product from WAN (Internet) side IPv6 network 
    and Log Output are both checked.
     Regard Ident packet 
    as an exceptionDisplay when saving log: STL (Ident)
    When clients try to send/receive E-mail, There is E-mail server that 
    authenticates E-mails to/from clients. This authentication uses 
    recognition protocol, which uses TCP port number 113. The 
    authentication level is relatively low so there are not many cases 
    where clients are unable to send /receive E-mails. In factory default 
    settings Regard Ident packet as an exception and Log Output are 
    both checked.
    IPv6 Intrusion 
    DetectionWhen using the intrusion detection function, check the box next to 
    each heading.
     IPv6 Stateful packet 
    inspection (Dynamic 
    packet filtering) is 
    enabled.Display when saving log: SPI
    If a packet being received from the WAN side is inspected, and 
    judged to be a corrupt packet, it is destroyed. By comparing the 
    packet to static filtering (packet filtering through header information), 
    Internet data can be sent more safely. In factory default settings IPv6 
    Stateful packet inspection (Dynamic packet filtering) is enabled and 
    Log Output are both checked.
     IPv6 Attack Detection 
    is enabled.Display when saving log: DoS
    Harmful data from the WAN side is detected, and the packet is 
    destroyed. A detection record is noted in the log.
    The following types of attacks can be detected:
    TCP Scan
    UDP Scan
     ICMP Echo 
    						
    All Panasonic manuals Comments (0)

    Related Manuals for Panasonic Network Camera Management System Bbhgw700a Operating Instructions