Panasonic AW-HE130W Home Security System User Manual


 
IMPORTANT
•Failuretoprovidetherequiredpersonalcomputerenvironment
mayslowdownthedelineationoftheimagesonthescreen,make
itimpossibleforthewebbrowsertoworkandcauseotherkindsof
problems.
<NOTE>
•Fordetailsoncomputerrequirementsandprecautionswhenusing
Microsoft
®
Windows
®
7,see“NotesonWindows
®
7”(→page@@).
•Dependingonthesoftwareversionoftheunit,anupdatemaybe
necessary.
•UsethedesktopversionofInternetExplorer.(InternetExplorerfor
WindowsUIisnotsupported.)
•Forthelatestinformationoncompatibleoperatingsystemsandweb
browsers,visitthesupportdeskatthefollowingwebsite.
http://pro-av.panasonic.net/
Disclaimer of warranty
INNOEVENTSHALLPanasonicCorporationBELIABLETOANY
PARTYORANYPERSON,EXCEPTFORREPLACEMENTOR
REASONABLEMAINTENANCEOFTHEPRODUCT,FORTHE
CASES,INCLUDINGBUTNOTLIMITEDTOBELOW:
AANYDAMAGEANDLOSS,INCLUDINGWITHOUTLIMITATION,
DIRECTORINDIRECT,SPECIAL,CONSEQUENTIALOR
EXEMPLARY,ARISINGOUTOFORRELATINGTOTHE
PRODUCT;
BPERSONALINJURYORANYDAMAGECAUSEDBY
INAPPROPRIATEUSEORNEGLIGENTOPERATIONOFTHE
USER;
CUNAUTHORIZEDDISASSEMBLE,REPAIRORMODIFICATION
OFTHEPRODUCTBYTHEUSER;
DINCONVENIENCEORANYLOSSARISINGWHENIMAGES
ARENOTDISPLAYED,DUETOANYREASONORCAUSE
INCLUDINGANYFAILUREORPROBLEMOFTHEPRODUCT;
EANYPROBLEM,CONSEQUENTIALINCONVENIENCE,
ORLOSSORDAMAGE,ARISINGOUTOFTHESYSTEM
COMBINEDBYTHEDEVICESOFTHIRDPARTY;
FANYDEMANDSFORCOMPENSATION,CLAIMS,ETC.
OCCASIONEDBYTHEINFRINGEMENTOFPRIVACYBY
INDIVIDUALSORORGANIZATIONSWHOSEIMAGESWERE
SHOTBYTHEUSERBECAUSETHESEIMAGES(INCLUDING
THERECORDINGSMADE)WEREMADEAVAILABLEBYTHE
USERBECAUSEINTHEPUBLICDOMAINFORSOMEREASON
OROTHERORBECAUSETHEIMAGESENDEDUPBEING
USEDFORPURPOSESOTHERTHANTHEONEDESCRIBED
ABOVE;
GLOSSOFREGISTEREDDATACAUSEDBYANYFAILURE.
Network security
Astheunitintendedtobeusedwhileconnectedtoanetwork,the
followingsecurityrisksexist.
ALeakageortheftofinformationthroughtheunit
BUnauthorizedoperationoftheunitbypersonswithmaliciousintent
CInterferencewithorstoppageoftheunitbypersonswithmalicious
intent
Itisyourresponsibilitytotakeprecautions,suchasthosedescribed
below,toprotectyourselfagainsttheabovenetworksecurityrisks.
•Usetheunitinanetworksecuredbyafirewall,etc.
•Iftheunitisconnectedtoanetworkthatincludespersonalcomputers,
makesurethatthesystemisnotinfectedbycomputervirusesorother
maliciousprograms(usingaregularlyupdatedantivirusprogram,anti-
spywareprogram,etc.).
•Protectyournetworkagainstunauthorizedaccessbyrestrictingusers
tothosewhologinwithanauthorizedusernameandpassword.
•Restrictaccesstotheunitbyauthenticatingtheusers,forexample,
topreventsettinginformationstoredontheunitfromleakingoverthe
network.
•Donotinstalltheunitinlocationswheretheunit,cables,andother
partscanbeeasilydamagedordestroyedbypersonswithmalicious
intent.
•Avoidconnectionsthatusepubliclines.
<NOTE>
Notes on user authentication
•Userauthenticationontheunitcanperformedviadigestauthentication
orbasicauthentication.Ifbasicauthenticationisusedwithouttheuse
ofadedicatedauthenticationdevice,passwordleaksmayoccur.
Werecommendusingdigestauthenticationorhostauthentication.
Usage restrictions
•Werecommendconnectingtheunit,controller,andanycomputersto
thesamenetworksegment.
Eventsbasedonsettingsinherenttothenetworkdevices,forexample,
mayoccurinconnectionsthatincludedifferentsegments,sobesure
performcheckspriortooperation.
10 11
Before use (continued)