background image

User’s Manual 

15 

1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6.

Enable HTTPS

We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.

7.

MAC Address Binding

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing
the risk of ARP spoofing.

8.

Assign Accounts and Privileges Reasonably

According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.

9.

Disable Unnecessary Services and Choose Secure Modes

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.

SMTP: Choose TLS to access mailbox server.

FTP: Choose SFTP, and set up strong passwords.

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.

10.

Audio and Video Encrypted Transmission

If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.

11.

Secure Auditing

Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.

Check device log: By viewing the logs, you can know the IP addresses that were used to log in
to your devices and their key operations.

12.

Network Log

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.

13.

Construct a Safe Network Environment

In order to better ensure the safety of device and reduce potential cyber risks, we recommend:

Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.

The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.

Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.

Enable IP/MAC address filtering function to limit the range of hosts allowed to access the

Summary of Contents for DHI-ARK30T-W2

Page 1: ...Wireless Keypad User s Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 0...

Page 2: ...methods to help you solve a problem or save time NOTE Provides additional information as a supplement to the text Revision History Version Revision Content Release Time V1 0 0 First release April 2022...

Page 3: ...and the manual Please contact customer service for the latest program and supplementary documentation There might be errors in the print or deviations in the description of the functions operations an...

Page 4: ...ements Connect the device to the adapter before power on Strictly abide by local electrical safety standards and make sure that the voltage in the area is steady and conforms to the power requirements...

Page 5: ...Installation 3 6 Configuration 5 6 1 Viewing Status 5 6 2 Configuring the keypad 6 7 User Management 8 7 1 Adding Users 8 7 2 Adding Card 9 7 2 1 Adding Card on the User Manager 9 7 2 2 Adding Card i...

Page 6: ...cription Function Indicator Light 4 indicators communication arming and disarming fault and alarm Key 15 keys 0 9 arm disarm and home arm Buzzer 1 built in buzzer Arm and Disarm Passcode IC card Remot...

Page 7: ...vice is used to arm and disarm once a day Product Dimensions 146 0 mm 82 0 mm 22 6 mm 5 75 3 23 0 89 Packaging Dimensions 180 0 mm 104 0 mm 58 0 mm 7 07 4 09 2 28 Installation Wall mount Net Weight 24...

Page 8: ...l 3 2 Checklist Figure 2 1 Checklist Table 2 1 Checklist No Item Name Quantity No Item Name Quantity 1 Keypad 1 4 IC card 2 2 Battery 4 5 Quick start guide 1 3 Screw package 1 6 Legal and regulatory i...

Page 9: ...User s Manual 4 3 Appearance Figure 3 1 Appearance...

Page 10: ...rming indicator status Solid blue A single or more rooms are armed Flashes green 3 times and then off All rooms are disarmed Fault indicator status Flashes yellow Fault alarms are triggered Off A sing...

Page 11: ...ure that the hub has a stable internet connection Make sure that the hub is disarmed Step 1 Go to the hub screen and then tap to add the keypad Step 2 Tap to scan the QR code at the bottom of the keyp...

Page 12: ...w Figure 5 2 Open the keypad Step 2 Insert four batteries into the keypad If the battery is dead you need to replace the battery When replacing the battery make sure that the side marked with faces th...

Page 13: ...User s Manual 4 Figure 5 4 Drill holes Step 4 Close the keypad Figure 5 5 Close the keypad Step 5 Secure the keypad with screw Figure 5 6 Secure the keypad...

Page 14: ...he environment Signal Strength The signal strength between the hub and the keypad Low Weak Good Excellent No Battery Level The battery level of the keypad Fully charged Sufficient Moderate Insufficien...

Page 15: ...an event happens Fire Alarm Enable by default After enabling the Fire Alarm when a fire is detected you need to press and hold the fire key on the keypad for 3 seconds to trigger fire alarms Link Fir...

Page 16: ...the keypad will enter into reduced sensitivity mode Card Reader Config Enable card reader function and soft encryption function on the keypad Card Reader Enable by default If enabled the keypad suppo...

Page 17: ...ice Details Hub Setting User Manager Step 3 Tap to add a user Step 4 Enter your username passcode and duress passcode and then select arming and disarming permissions for the room Passcode and duress...

Page 18: ...3 Select the user to whom you want to link the card Step 4 Tap Step 5 Press any key to wake up the keypad and then place the card near the card swiping area of the keypad to enter to the linking proce...

Page 19: ...User s Manual 10 Step 7 Tap Completed...

Page 20: ...oom No Clear Press and hold 8 2 Waking Up the Keypad Press and hold any key for more than 0 1 seconds to wake up the keypad When you hear a short beep and see all the indicator lights are solid then y...

Page 21: ...Disarming If global disarming is successful the arming and disarming indicator light will flash green 3 times slowly and then turn off with 2 short beeps After successfully disarming the system if the...

Page 22: ...d on for 6 seconds if there are faults on the peripherals and the hub The alarm indicator light is solid on for 6 seconds if alarm events occur in the room If your search fails because of reasons such...

Page 23: ...rmation of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security...

Page 24: ...dio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check onli...

Page 25: ...User s Manual 16 device More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations...

Page 26: ...User s Manual...

Reviews: