background image

Cybersecurity  Recommendations

   

16

 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7.  Enable Whitelist 

We suggest you to enable whitelist function to prevent everyone, except those with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.  MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the equipment, 

thus reducing the risk of ARP spoofing. 

9.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 

 

SNMP

Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

 

SMTP

Choose TLS to access mailbox server. 

 

FTP

Choose SFTP, and set up strong passwords.   

 

AP hotspot

Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.  Secure Auditing   

 

Check online users: we suggest that you check online users regularly to see if the 

device is logged in without authorization.   

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14.  Construct a Safe Network Environment 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

Summary of Contents for ASA1222G-D

Page 1: ...Time Attendance Terminal Quick Start Guide V1 0 0...

Page 2: ...the ventilation of the access standalone Operate the access standalone within the rated range of power input and output Do not dissemble the access standalone Transport use and store the access stand...

Page 3: ...e and the actual product the actual product shall prevail We are not liable for any loss caused by the operations that do not comply with the Guide The Guide would be updated according to the latest l...

Page 4: ...Foreword IV If there is any uncertainty or controversy please refer to our final explanation...

Page 5: ...2 1 Cable Connection 5 2 2 3 Operation 6 Notice 6 3 1 Main Menu 6 3 2 Configure Network Parameters 7 3 3 Add Users 8 3 4 3 4 1 Add One by One 8 3 4 2 Add in Batches 9 Shift 10 3 5 3 5 1 Shift Setting...

Page 6: ...information ID name fingerprint password card number can be recorded on the time attendance standalone Stores up to 100 000 attendance record reports and 10 000 management records All users can query...

Page 7: ...rface press the key to check out Delete key or shortcut key for reviewing records When the terminal is off on press the key to turn the terminal on off press the key for over three seconds to turn the...

Page 8: ...Overview 3 Port Description COM COM port NO Makes the relay normally on Dimensions 1 4 Dimensions mm Figure 1 3...

Page 9: ...nstallation Installation Methods 2 1 Installed through 86 electrical box Installed through 86 electrical box Figure 2 1 Directly installed on the wall Directly installed on the wall Figure 2 2 Install...

Page 10: ...Installation 5 Installed through bracket Figure 2 3 Cable Connection 2 2 The terminal can be connected to exit button to control the door See Figure 2 4 Cable connection Figure 2 4...

Page 11: ...d then select a user ID Select User Level press OK F4 and then F2 or F3 to select Administrator When you need to connect the terminal to SmartPSS the management platform the default ID is admin and th...

Page 12: ...goes by the battery life reduces Main menu Press and then the main menu will be displayed See Figure 3 3 Main menu Figure 3 3 After you have created administrators you need to press first and then you...

Page 13: ...according to your needs Gateway Default value 192 168 1 1 you can configure it according to your needs MAC MAC address of the terminal and it cannot be modified Port Port number used to login the ter...

Page 14: ...the user ID length range can be 1 99999999 Maximum user name length is 16 letters Passwords can be numbers of 1 8 digits Zero alone cannot be set as password and cannot be the first number of a passwo...

Page 15: ...rmation with the same User ID will be overwritten On the main menu select 4 USB Import User Info Step 1 The prompt New info will cover the before one will be displayed Press Confirm OK Step 2 And then...

Page 16: ...sign out records as effective In Overtime Session there is no late early leave time setup Import Export shift Once you have done shift settings on a terminal you can export the settings through flash...

Page 17: ...ing or importing will fail and system malfunction will occur Once you have done schedule settings on a terminal you can export the settings through flash drives and then import them to other terminals...

Page 18: ...then do fingerprint password or card attendance check You can get your attendance recorded without doing shift settings and without selecting attendance events 3 6 2 Fixed In the Fixed mode you can se...

Page 19: ...he screen and then you can make an attendance when you return to the company during the work time by fingerprint password or card OK F4 Press OK F4 CHECK OUT will be displayed on the screen and then y...

Page 20: ...mmended to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client so...

Page 21: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Page 22: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Reviews: