background image

13 

 

The following are necessary measures for the network security of your device: 

 

Change default password and set strong password:  You are strongly recommended to 

change the default password after your first login and set a strong password of at least nine 

characters including all three elements: digits, letters and special characters. 

 

Keep firmware up to date: It is recommended that your device is always upgraded to the 

latest version for the latest functions and better security. Visit our official website or contact 

your local dealer for the latest firmware. 

The following are recommendations for enhancing network security of your device: 

 

Change password regularly: Change your device password on a regular basis and keep the 

password safe. Make sure only the authorized user can log in to the device. 

 

Enable HTTPS/SSL: Use SSL certificate to encrypt HTTP communications and ensure data 

security. 

 

Enable IP address filtering: Allow access only from the specified IP addresses. 

 

Minimum port mapping: Configure your router or firewall to open a minimum set of ports 

to the WAN and keep only the necessary port mappings. Never set the device as the DMZ 

host or configure a full cone NAT. 

 

Disable the automatic login and save password features: If multiple users have access to 

your computer, it is recommended that you disable these features to prevent unauthorized 

access. 

 

Choose username and password discretely: Avoid using the username and password of your 

social media, bank, email account, etc, as the username and password of your device, in case 

your social media, bank and email account information is leaked. 

 

Restrict user permissions: If more than one user needs access to your system, make sure 

each user is granted only the necessary permissions. 

 

Disable UPnP: When UPnP is enabled, the router will automatically map internal ports, and 

the system will automatically forward port data, which results in the risks of data leakage. 

Therefore, it is recommended to disable UPnP if HTTP and TCP port mapping have been 

enabled manually on your router. 

 

SNMP: Disable SNMP if you do not use it. If you do use it, then SNMPv3 is recommended. 

 

Multicast: Multicast is intended to transmit video to multiple devices. If you do not use this 

function, it is recommended you disable multicast on your network. 

 

Check logs: Check your device logs regularly to detect unauthorized access or abnormal 

operations. 

 

Physical protection: Keep the device in a locked room or cabinet to prevent unauthorized 

physical access. 

 

Isolate video surveillance network: Isolating your video surveillance network with other 

service networks helps prevent unauthorized access to devices in your security system from 

other service networks. 

 Safety Warnings 

 

The device must be installed, serviced and maintained by a trained professional with necessary 

safety knowledge and skills. Before you start using the device, please read through this guide 

carefully and make sure all applicable requirements are met to avoid danger and loss of property. 

Storage, Transportation, and Use 

Summary of Contents for 2MTHFR-2M

Page 1: ...2M TECHNOLOGY Face Recognition Access Control Terminal with Digital Temperature Measurement Module 2MTHFR 2M Quick Guide Version 1 01 REV05182020...

Page 2: ...ement distance It can connect to a face recognition access control terminal through the RS485 interface The module supports temperature measurement and personnel information binding It is capable of r...

Page 3: ...lution of blackbody target Pollution degree 2 If the euipment is used in a manner not specified by the manufacturer the protection provided by the equipment may be impaired 2 Appearance and Size Appea...

Page 4: ...re sensor 2 4 pin cable 1 Temperature sensor 2 Indicator 3 4 pin cable 3 Structure and Cable Structures and cables vary with device type The actual product shall prevail Structure and Cable 1 Structur...

Page 5: ...M4x11 screws and two M4 wing nuts 3 Device Installation 3 1 Device Wiring 1 Cable layout description Before installing the digital detection module plan the layout of the power cable For the diameter...

Page 6: ...ws the wiring between the digital detection module and different devices For the wiring terminal of each device see the operation manual of the device or consult manufacturers Digital detection module...

Page 7: ...of the face recognition access control terminal face recognition terminal 1 Wall mount The figure below shows the process of installing the digital detection module on a wall when the module is to be...

Page 8: ...digital temperature measurement module on a standing pole when the module is to be used in combination with a face recognition terminal 1 Remove the black panel 2 Remove the four screws on the back an...

Page 9: ...uration When the digital detection module is used in combination with a face recognition access control terminal you can enable the temperature measurement function on the Authentication Scene interfa...

Page 10: ...oose Setup Intelligent Advanced Setting to enable the temperature measurement function 3 Device operations When the temperature needs to be measured a personneeds to getclose to occupy the human shape...

Page 11: ...from an outdoor low temperature environment to the measurement area the person needs to stay in this area for 5 min before the temperature is taken What should I do if the tempe rature measured by the...

Page 12: ...n any form by any means without prior consent in writing from our company referred toas us hereafter The product described in this manual may contain proprietary software owned by our company and its...

Page 13: ...lar purpose and noninfringement Users must assume total responsibility and all risks for connecting the product to the Internet including but not limited to network attack hacking and virus We strongl...

Page 14: ...id using the username and password of your social media bank email account etc as the username and password of your device in case your social media bank and email account information is leaked Restri...

Page 15: ...icalsafety regulations Use a UL certified power supply that meets LPS requirements if an adapter isused Use the recommended cordset power cord in accordance with the specified ratings Only use the pow...

Page 16: ...to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates...

Page 17: ...802 Greenview Dr Grand Prairie TX 75050 USA Toll Free 1 866 708 5401 Fax 1 972 999 4113 sales 2MTechnology net...

Reviews: