background image

 

22 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7. 

Enable Whitelist

 

We suggest you to enable whitelist function to prevent everyone, except those with specified IP 
addresses, from accessing the system. Therefore, please be sure to add your computer’s IP 
address and the accompanying equipment’s IP address to the whitelist. 

8. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus 
reducing the risk of ARP spoofing. 

9. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

10. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords. 

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12. 

Secure Auditing

 

  Check online users: we suggest that you check online users regularly to see if the device is 

logged in without authorization. 

  Check equipment log: By viewing the logs, you can know the IP addresses that were used to 

log in to your devices and their key operations. 

13. 

Network Log

 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to 
save the log for a long time, it is recommended that you enable the network log function to 
ensure that the critical logs are synchronized to the network log server for tracing. 

14. 

Construct a Safe Network Environment

 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 
recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

Summary of Contents for D-SDZ4032-HNR-ZB

Page 1: ...Network Speed Dome PTZ Camera Installation Manual V1 0 0...

Page 2: ...al The manual is for reference only If there is inconsistency between the manual and the actual product the actual product shall prevail We are not liable for any loss caused by the operations that do...

Page 3: ...ective owners Please visit our website contact the supplier or customer service if there is any problem occurred when using the Camera If there is any uncertainty or controversy please refer to our fi...

Page 4: ...Device otherwise it might cause fire short circuit or other damage Avoid sea water or rain eroding the Device Avoid the lens aiming at intense light source including sunlight and incandescent light ot...

Page 5: ...ct your local retailer or customer service center Cleaning Requirements Clean the enclosure with soft cloth To remove the dirt you can dip the soft cloth in proper detergent wring the soft cloth out a...

Page 6: ...on 6 2 2 1 Alarm Cable Connection 6 2 2 2 Thunder Proof Cable Connection 6 2 2 2 1 Outdoor 6 2 2 2 2 Indoor 8 3 RS 485 Cable 10 3 1 Basic Features 10 3 2 Common Issues in Use 10 3 3 FAQ on RS 485 Cabl...

Page 7: ...the place where the Device is installed can sustain at least 4 times the weight of the Device and its mounting accessories for speed domes make sure that the ceiling and wall can sustain 8 times the w...

Page 8: ...0bps 800 m The maximum transmission distance will be reduced in the following conditions When thinner communication cables are used the Device is used in places with intense electromagnetic interferen...

Page 9: ...3 1 3 3 2 PoE Power Cable Table 1 4 PoE power cable POE Specification Network Cable Specification AF CAT5E and network cables with higher standard AT HiPoE or BT...

Page 10: ...iption The Device is equipped with a multi functional combination cable by default including power cord video cable audio cable RS 485 control cable alarm cable network cable and optical fiber cable F...

Page 11: ...hall prevail The manual will introduce the cables as complete as possible Figure 2 1 Cables Table 2 1 Cable description No Description 1 FC connector 2 DC power input port 3 24V AC power input Red V B...

Page 12: ...able and alarm output is relay switch output Step 3 Go to the web interface of the Device and complete settings for alarm input and output devices The alarm input on Web interface corresponds to the a...

Page 13: ...and regulations You must do equipotential grounding to the electric system The grounding device must meet the requirements of anti jamming and conform to your local electrical safety code The groundin...

Page 14: ...uctor L2 The length of the rail that holds the Device H The length of the lightning conductor To get the value of L1 you need to use the formula 2 2 2 2 Indoor You shall use multiple copper cables who...

Page 15: ...9 Figure 2 4 Installing lightning protection devices indoors Table 2 3 Installing lightning protection devices indoors No Name 1 Yellow green grounding cable 2 Indoor equipotential grounding terminal...

Page 16: ...wo devices whose cable length is the longest among all the devices in Figure 3 1 cable length between 1 and 15 is the longest However this connection manner does not comply with the RS 485 industrial...

Page 17: ...electrode of RS 485 cable are misconnected Connect cables to the positive electrode and negative electrode correctly Loose connection Connect the cables firmly RS 485 cable is broken Replace RS 485 ca...

Page 18: ...king channel shall prevail Transmission performance At open places without interference if the Device is installed at least 1 5 m above the ground the effective communication distance is 100 m In the...

Page 19: ...oot m Table 5 1 Cable diameter 24V AC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmi...

Page 20: ...smission distance is foot m Table 6 1 Cable diameter 12V DC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance...

Page 21: ...ameter 24V DC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter...

Page 22: ...ssion Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 1357 414 2120 646 3313 1010 8481 2585 10...

Page 23: ...Diameter 1 25 Transmission Distance Diameter 2 00 120 57 17 88 27 138 42 353 108 130 52 16 82 25 127 39 326 99 140 48 15 76 23 118 36 303 92 150 45 14 71 22 110 34 283 86 160 42 13 66 20 104 32 265 8...

Page 24: ...mission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 2290 698 3578 1091 5591 1704 14312 4362 10 1145 349 1789 54...

Page 25: ...istance Diameter 1 25 Transmission Distance Diameter 2 00 130 88 27 138 42 215 66 550 168 140 82 25 128 39 200 61 511 156 150 76 23 119 36 186 57 477 145 160 72 22 112 34 175 53 447 136 170 67 20 105...

Page 26: ...950 0 130 36 39 0 01327 0 140 35 0 01539 0 160 34 37 0 02011 0 180 33 0 02545 0 200 32 35 0 03142 0 230 31 0 04115 0 250 30 33 0 04909 0 290 29 31 0 06605 0 330 28 30 0 08553 0 350 27 29 0 09621 0 400...

Page 27: ...suggest that you download and use the latest version of client software Nice to have recommendations to improve your equipment network security 1 Physical Protection We suggest that you perform physi...

Page 28: ...d Video Encrypted Transmission If your audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video dat...

Page 29: ...23 Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks...

Reviews: