background image

Cybersecurity  Recommendations

   

69

 

 Cybersecurity Recommendations 

Appendix 1

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 

steps toward protecting and strengthening networks and networked appliances will make them 

less  susceptible  to  attacks.  Below  are  some  tips  and  recommendations  on  how  to  create  a 

more secured security system. 

Mandatory actions to be taken for basic equipment network security: 

1.  Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 

letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.  Update Firmware and Client Software in Time 

 

According  to  the  standard  procedure  in  Tech-industry,  we  recommend  to  keep  your 

equipment  (such  as  NVR,  DVR,  IP  camera,  etc.)  firmware  up-to-date  to  ensure  the 

system is equipped with the latest security patches and fixes. When the equipment is 

connected  to  the  p

ublic  network,  it  is  recommended  to  enable  the  “auto-check  for 

updates”  function  to  obtain  timely  information  of  firmware  updates  released  by  the 
manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your equipment network security: 

1.  Physical Protection 

We suggest that you perform physical protection to equipment, especially storage devices. 

For example, place the equipment in a special computer room and cabinet, and implement 

well-done  access  control  permission  and  key  management  to  prevent  unauthorized 

personnel from carrying out physical contacts such as damaging hardware, unauthorized 

connection of removable equipment (such as USB flash disk, serial port), etc. 

2.  Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 

cracked. 

3.  Set and Update Passwords Reset Information Timely   

The  equipment  supports  password  reset  function.  Please  set  up  related  information  for 

password  reset 

in  time,  including  the  end  user’s  mailbox  and  password  protection 

questions.  If  the  information  changes,  please  modify  it  in  time.  When  setting  password 

protection questions, it is suggested not to use those that can be easily guessed. 

4.  Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

Summary of Contents for ASI7223X-A

Page 1: ...Face Recognition Terminal User s Manual V1 0 0 ...

Page 2: ... manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electronic version shall prevail All the designs and software are subject to change without prior written notice The product updates might cause some differences between the actual product and the manual Please contact the customer service for the latest program and suppleme...

Page 3: ...of the terminal Operate the terminal within the rated range of power input and output Do not dissemble the terminal Transport use and store the terminal under the allowed humidity and temperature conditions Electrical Safety Improper battery use might result in fire explosion or inflammation When replacing battery make sure the same model is used Use the recommended power cables in the region and ...

Page 4: ...n Menu 11 3 5 Terminal User Management 12 3 6 3 6 1 Adding New Users 12 3 6 2 Viewing User information 14 Access Management 14 3 7 3 7 1 Period Management 14 3 7 2 Unlock 15 3 7 3 Alarm Configuration 19 3 7 4 Door Status 20 3 7 5 Lock Holding Time 20 Network Communication 20 3 8 3 8 1 IP Address 20 3 8 2 Serial Port Settings 22 3 8 3 Wiegand Configuration 23 System 23 3 9 3 9 1 Time 23 3 9 2 Face ...

Page 5: ...42 4 6 2 Image 43 4 6 3 Exposure 44 4 6 4 Motion Detection 45 4 6 5 Volume Setting 46 4 6 6 Image Mode 47 Face Detect 47 4 7 Network Setting 49 4 8 4 8 1 TCP IP 49 4 8 2 Port 51 4 8 3 Register 51 4 8 4 P2P 51 Safety Management 53 4 9 4 9 1 IP Authority 53 4 9 2 Systems 53 4 9 3 User Management 54 4 9 4 Maintenance 54 4 9 5 Configuration Management 55 4 9 6 Upgrade 55 4 9 7 Version Information 55 4...

Page 6: ...sers 60 5 3 5 3 1 Card Type Selection 61 5 3 2 Add One User 62 Add Door Group 63 5 4 Access Permission Configuration 65 5 5 5 5 1 Giving Permission by Door Group 65 5 5 2 Giving Permission by User ID 67 Cybersecurity Recommendations 69 Appendix 1 ...

Page 7: ...igured on the web 2MP wide angle WDR lens with auto manual fill light Face camera distance 0 3 m 2 0 m human height 0 9 m 2 4 m With face recognition algorithm the terminal can recognize more than 360 positions on human face Face verification accuracy 99 5 low false recognition rate Support profile recognition the profile angle is 0 90 Support liveness detection Support duress alarm and tamper ala...

Page 8: ...erview 2 Dimension and Component 1 3 Dimensions and components 1 mm inch Figure 1 1 Table 1 1 Component description 1 No Name 1 Dual camera 2 IR light 3 Phototransistor 4 White fill light 5 Display 6 MIC ...

Page 9: ...Overview 3 Dimensions and components 2 mm inch Figure 1 2 Table 1 2 Component description 2 No Name 1 Dual camera 2 IR light 3 Phototransistor 4 White fill light 5 Display 6 MIC ...

Page 10: ... output connected to controller Yellow B RS 485 negative electrode input connected to external reader output connected to controller or connected to door control security module If the security module is enabled you need to purchase access control security module separately The security module needs separate power supply to provide power Once the security module is enabled the exit button lock con...

Page 11: ...ommon GND port White Brown ALARM1 Alarm 1 input port White and yellow GND Common GND port White and purple PUSH2 Exit button of door No 2 CON3 Black and red RX RS 232 receiving port Black and orange TX RS 232 sending port Black and blue GND Common GND port Black and gray SR1 NA Black and green PUSH1 Exit button of door No 1 Black and brown DOOR1_COM Gate machine control normally closed port Black ...

Page 12: ...le 2 2 Component description 2 No Name 1 Ornamental cover 2 M5 screw 3 Waterproof silica gel plug 4 Terminal 5 Cable Installation of the 10 in terminal Figure 2 2 Table 2 3 Component description 3 No Name 1 Terminal 2 Ornamental cover 3 M5 screw 4 Cable 5 Waterproof silica gel plug ...

Page 13: ... plug on the cable Step 2 Fix the terminal onto the turnstile with M5 screw Step 3 Connect cables for terminal See 2 1 Cable Connections Apply sealant to gaps between the waterproof silica gel plug and turnstile Step 4 Install the ornamental cover on the base of the terminal Step 5 The installation is competed ...

Page 14: ... to the previous page Go to the next page Go to the previous menu Go to the next menu Initialization 3 2 Administrator password and an email should be set the first time the terminal is turned on otherwise the terminal cannot be used Initialization Figure 3 1 Administrator and password set on this interface are used to login the web management platform ...

Page 15: ...characters and contain at least two types of characters among upper case lower case number and special character excluding Standby Interface 3 3 You can unlock the door through faces passwords and QR code See Table 3 2 If there are no operations in 30 seconds the terminal will go to the standby mode The following figures are for reference only and the actual interface shall prevail Homepage Figure...

Page 16: ...he door 3 4 2 User Passwords Enter the user passwords and then you can unlock the door Tap on the homepage Step 1 Enter the User ID and then tap Step 2 Enter the User password and then tap Step 3 The door is unlocked 3 4 3 Administrator Password Enter the administrator password and then you can unlock the door There is only one administrator password for one terminal The administrator password can...

Page 17: ...access records and system information and more in the main menu Tap on the standby interface Step 1 The Administrator Login interface is displayed Different modes support different unlock methods and the actual interface shall prevail Administrator login Figure 3 3 Select a main menu entering method Step 2 The main menu interface is displayed ...

Page 18: ...assword on the User interface 3 6 1 Adding New Users You can add new users by entering user IDs names importing fingerprints face images cards passwords selecting user levels and more The following figures are for reference only and the actual interface shall prevail Select User New User Step 1 The New User Info interface is displayed See Figure 3 5 ...

Page 19: ...or details about face image recording see the Quick Start Guide Password The door unlocking password The maximum length of the ID digits is 8 If the terminal is without touch screen you need to connect the terminal to a peripheral card reader There are buttons on the card reader Level You can select a user level for new users There are two options User Users only have door unlock authority Admin A...

Page 20: ... closed Use Time When the user level is Guest you can set the maximum number of times that the guest can unlock the door After you have configured all the parameters tap to save the configuration Step 3 3 6 2 Viewing User information You can view user list admin list and enable administrator password through the User interface Access Management 3 7 You can do access management on period unlock mod...

Page 21: ...iod is added to the NC period then the door is normally closed in that period Users can not unlock the door in this period 3 7 1 6 Remote Verification Period If you configured the remote verification period then when unlock doors during the period you configured remote verification is required To unlock the door in this period a door unlock instruction sent by the management platform is needed You...

Page 22: ...e Step 3 And means and For example if you selected card FP it means to unlock the door you need to swipe your card first and then get your fingerprint scanned Or means or For example if you selected card FP it means to unlock the door you can either swipe your card or get your fingerprints scanned Tap to save the settings Step 4 And then the Unlock Mode interface is displayed Enable the Unlock Mod...

Page 23: ...by Period Step 1 The Unlock Config by Period interface is displayed See Figure 3 7 Unlock by period Figure 3 7 Set starting time and end time for a period and then select a unlock mode Step 2 Tap to save the settings Step 3 The Unlock Mode interface is displayed Enable the Unlock by Period function Step 4 means enabled means not enabled 3 7 2 3 Group Combination Doors can only be unlocked by a gro...

Page 24: ...Unlock Mode Group Combination Step 1 The Group Combination Config interface is displayed See Figure 3 8 Group Combination Figure 3 8 Tap to create a group Step 2 The Add Group interface is displayed See Figure 3 9 Add a group Figure 3 9 ...

Page 25: ...d the total number of users in a group If valid users equal total user numbers in a group doors can only be unlocked by all the users in the group If valid users are less than the total number of users in a group doors can be unlocked by any users whose number equals the valid user number Tap to go back to the previous interface Step 3 Tap to save the settings Step 4 Enable the Group Combination S...

Page 26: ... is used to unlock the door more than 5 times in 50 seconds an alarm will be triggered 3 7 4 Door Status There are three options NO NC and Normal NO If NO is selected the door status is normally open which means the door will never be closed NC If NC is selected the door status is normally closed which means the door will not be unlocked Normal If Normal is selected the door will be unlocked and l...

Page 27: ...ddress subnet mask and gateway IP address cannot be manually configured P2P P2P is a private network traversal technology which enables user to manage devices without requiring DDNS port mapping or transit server 3 8 1 2 Active Register By active registering you can connect the terminal to the management platform and then you can manage the terminal through the management platform Configurations y...

Page 28: ...ement platform When Serial Input is selected to make the terminal be connected to the reader in the turnstile you need to select Door 1 or Door 2 as needed Door 1 If Door 1 is selected then the reader and terminal control the same door opening direction For example both the reader and terminal control the entering direction into a place or all control the exiting direction from a place Door 2 If D...

Page 29: ... terminal control different door opening directions For example the terminal controls the entering direction into a place and the reader controls the exiting direction from a place Select Wiegand Output when the terminal works as a reader that can be connected to the controller See Table 3 8 Table 3 8 Wiegand output Parameter Description Wiegand output type The Wiegand Output Type determines the c...

Page 30: ... of the profiles will be recognized Recognition Timeout When a person who does not have the access authority stands in front of the terminal and gets the face recognized the controller will prompt that face recognition failed The prompt interval is called recognition timeout Pupillary Distance Pupillary distance is the pixel value of the image between the centers of the pupils in each eye You need...

Page 31: ...lect fill light brightness according to your needs 3 9 5 Volume Adjustment Tap or to adjust the volume 3 9 6 IR Light Brightness Adjustment The larger the value is the clearer the images will be otherwise the unclearer the images will be 3 9 7 Restore to Factory Settings Data will be lost if you restore the access controller to the factory settings After the access controller is restored to the fa...

Page 32: ...efore using USB to import information to another terminal USB can also be used to update the program 3 10 1 USB Export You can export data from the terminal to the USB after inserting the USB The data exported is encrypted and cannot be edited Select USB USB Export Step 1 The USB Export interface is displayed See Figure 3 15 USB export Figure 3 15 Select the data type that you want to export Step ...

Page 33: ... USB will be imported into the terminal 3 10 3 USB Update USB can be used to update the system Rename the updating file name to update bin and save the update bin file in the Step 1 root directory of the USB Select USB USB Update Step 2 The prompt Confirm to Update is displayed Tap OK Step 3 The update starts and the terminal reboots after the update is finished 3 10 4 Features You can do settings...

Page 34: ... otherwise the communication between the terminal and the third party card reader might fail due to protocol discrepancy Security Module If the security module is enabled you need to purchase access control security module separately The security module needs separate power supply to provide power Once the security module is enabled the exit button lock control and firefighting linkage will be inv...

Page 35: ...ard protocol for web servers to execute programs that execute like console applications running on a server that generates web pages dynamically When CGI is enabled CGI commands can be used The CGI is enabled by default SSH Secure Shell SSH is a cryptographic network protocol for operating network services securely over an unsecured network When SSH is enabled SSH provides cryptographic service fo...

Page 36: ...System Operation 30 3 10 5 Result Feedback You can select a result feedback mode as needed Mode 1 Mode 1 Figure 3 19 ...

Page 37: ...System Operation 31 Mode 2 Mode 2 Figure 3 20 Mode 3 Mode 3 Figure 3 21 ...

Page 38: ...System Operation 32 Mode 4 Mode 4 Figure 3 22 Record 3 11 You can query all unlocking records ...

Page 39: ...ch records Figure 3 23 Auto Test 3 12 When you use the terminal for the first time or when the terminal malfunctioned you can use auto test function to check whether the terminal can work normally Do actions according to the prompts ...

Page 40: ... test Figure 3 24 When you select Auto Test the terminal will guide you to do all the auto tests System Info 3 13 You can view data capacity device version and firmware information of the terminal on the System Info interface ...

Page 41: ...e 4 1 Use browser newer than IE 8 otherwise you might not log in to the web Initialization Figure 4 1 Enter the new password confirm password enter an email address and then tap Next Step 2 For security keep the password properly after initialization and change the password regularly The password should consist of 8 to 32 non blank characters and contain at least two types of characters among uppe...

Page 42: ...e selected to get the latest program in time Click Next Step 5 The configuration is finished See Figure 4 3 Finished configuration Figure 4 3 Click Complete and the initialization is completed Step 6 The web login interface is displayed Login 4 2 Open IE web browser enter the IP address of the terminal in the address bar and Step 1 ...

Page 43: ...rator regularly and keep it properly for the sake of security If you forget the administrator login password you can click Forget password to reset it See 4 3 Reset the Password Click Login Step 3 The web interface is logged in Reset the Password 4 3 When resetting the password of the admin account your email address will be needed Click Forget password on the login interface Step 1 The Tips inter...

Page 44: ... 6 Scan the QR code on the interface and you will get the security code Step 4 At most two security codes will be generated by scanning the same QR code To get more security code refresh the QR code You need to send the content you get after you scanned the QR code to the designated email address and then you will get the security code ...

Page 45: ...7 The password should consist of 8 to 32 non blank characters and contain at least two types of characters among upper case lower case number and special character excluding Click OK and the reset is completed Step 8 Alarm Linkage 4 4 4 4 1 Setting Alarm Linkage Alarm input devices can be connected to the terminal and you can modify the alarm linkage parameter as needed Select Alarm Linkage on the...

Page 46: ...re NO by default if fire link is enabled Alarm Output Enable The relay can output alarm information will be sent to the management platform if the Alarm Output is enabled Duration Sec The alarm duration and the range is 1 300 seconds Alarm Output Channel You can select an alarm output channel according to the alarming device that you have installed Each alarm device can be regarded as a channel Ac...

Page 47: ...The Alarm Log interface is displayed See Figure 4 9 Alarm log Figure 4 9 Select a time range and alarm type and then click Query Step 2 The query results are displayed See Figure 4 10 Query results Figure 4 10 Data Capacity 4 5 You can see how many users cards face images and fingerprints the terminal can hold on the Data Capacity interface ...

Page 48: ...criptions see Table 4 2 Data rate Figure 4 12 Table 4 2 Data rate parameter description Parameter Description Video Standard There are two options NTSC and PAL Select a standard according to the video standard of your region Channel There are two options 1 and 2 1 is white light camera and 2 is IR light camera Main Format Video Format There are four options D1 VGA 720p and 1080p Select an option a...

Page 49: ... 448Kbps 512Kbps 640Kbps 768Kbps 896Kbps 1024Kbps 1 25Mbps 1 5Mbps and 1 75Mbps 4 6 2 Image There are two channels and you need to configure parameters for each channel Select Video Setting Video Setting Image Step 1 Image Figure 4 13 Select Wide Dynamic in the Backlight Mode Step 2 Table 4 3 Image parameter description Parameter Description Brightness The larger the value is the brighter the imag...

Page 50: ...ects in the bright areas and dark areas When human faces are in the backlight you need to enable the Wide Dynamic HLC Highlight compensation is needed to compensate for overexposure of highlights or strong light sources like spotlights headlights porch lights etc to create an image that is usable and not overtaken by a bright light Mirror When the function is enabled images will be displayed with ...

Page 51: ...ue manually to adjust image brightness Shutter The larger the shutter value is and the shorter the exposure time is the darker the images will be Shutter Value Range If you select Customized Range you can customize the shutter value range Gain Value Range When the gain value range is set video quality will be improved Exposure Compensation You can increase video brightness by adjusting exposure co...

Page 52: ...re motion detection area The default motion detection range is all the rectangles To draw a motion detection area you need to click Remove All first The motion detection area you draw will be a non motion detection area if you draw in the default motion detection area Motion detection area Figure 4 15 Click OK to finish the setting Step 3 4 6 5 Volume Setting You can adjust volume of the terminal ...

Page 53: ...r when the terminal is installed outdoors and select Other when the terminal is installed at places with backlights like corridors and hallways Image mode Figure 4 17 Face Detect 4 7 You can configure human face related parameters on this interface to increase the accuracy of the face recognition Select Face Detect Step 1 The Face Detect interface is displayed See Figure 4 18 ...

Page 54: ...ght brightness Fill Light Mode Setting There are three fill light modes NO Fill light is normally open NC Fill light is normally closed Auto Fill light will be automatically on when a motion detection event is triggered When Auto is selected the fill light will not be on even if Infrared Light value is greater than 19 Infrared Light Adjust IR brightnees by dragging the scroll bar Recognition Timeo...

Page 55: ...sure is enabled human face will be clearer when the terminal is installed outdoors Channel Id There are two options 1 and 2 1 is white light camera and 2 is IR light camera Draw Target Click Draw Target and then you can draw the minimum face detection frame Click Remove All and you can remove all the frames you drew Detect Region Click Detect Region move your mouse and you can adjust the face dete...

Page 56: ...ubnet mask and gateway address will all be zero If you want to see the default IP when DHCP is effective disable DHCP Link local address Link local address is only available when IPv6 is selected in the IP version Unique link local addresses will be assigned to network interface controller in each local area network to enable communications The link local address cannot be modified IP Address Ente...

Page 57: ...gh browsers HTTPS Port Default value is 443 RTSP Port Default value is 554 Click OK to complete the setting Step 3 4 8 3 Register When connected to external network the terminal will report its address to the server that is designated by the user so that clients can get access to the terminal Select Network Setting Auto Register Step 1 The Auto Register interface is displayed Select Enable and ent...

Page 58: ... P2P you must connect the terminal to external network otherwise the terminal cannot be used P2P Figure 4 20 Select Network Setting P2P Step 1 The P2P interface is displayed Select Enable to enable P2P function Step 2 Click OK to complete the setting Step 3 Scan the QR code on your web interface to get the serial number of the terminal ...

Page 59: ...4 9 2 Systems 4 9 2 1 System Service There are four options SSH PWD Reset Enable CGI and HTTPS Refer to 3 10 4 Features to select one or more than one of them The system service configuration done on the web page and the configuration on the Features interface of the terminal will be synchronized System service Figure 4 22 ...

Page 60: ...nscreen instructions 4 9 3 User Management You can add and delete users modify users passwords and enter an email address for resetting the password when you forget your password 4 9 3 1 Add Users Click Add on the User Mgmt interface to add users and then enter username password confirmed password and remark Click OK to complete the user adding 4 9 3 2 Modify User Information You can modify user i...

Page 61: ...anagement When more than one terminal needs the same configuration you can configure parameters for them by importing or exporting configuration files See Figure 4 25 Configuration management Figure 4 25 4 9 6 Upgrade You can select Auto Check to upgrade the system automatically You can also select Manual Check to upgrade the system manually 4 9 7 Version Information You can view information inclu...

Page 62: ... can view username IP address and user login time on the Online User interface See Figure 4 26 Online user Figure 4 26 System Log 4 10 You can view and backup the system log on the System Log interface See Figure 4 27 System log Figure 4 27 ...

Page 63: ...o back up the logs displayed Admin Log 4 11 Enter Admin ID on the Admin Log interface click Query and then you will see the administrator s operation records See Figure 4 28 Admin log Figure 4 28 Hover the mouse cursor over and then you can see detailed information of the current user Exit 4 12 Click click OK and then you will log out the web interface ...

Page 64: ...interface shall prevail Login 5 1 Install the Smart PSS the username is admin and the password is admin123 by default double click to operate it Follow the instructions to finish the initialization and log in Add Devices 5 2 You need to add terminals to the Smart PSS You can click Auto Search to add and click Add to manually add 5 2 1 Auto Search You can search and add terminals at the same networ...

Page 65: ...rmation dialog box will be displayed Enter the username and the login password to login Step 3 You can see the added terminal on the Devices interface Select a terminal click Modify IP and you can modify the terminal s IP address For details about IP address modification see Smart PSS user manual 5 2 2 Manual Add You need to know IP addresses and domain names of terminals that you want to add See ...

Page 66: ...elect a method to add enter the IP Domain Name Port Step 2 number 37777 by default Group Name User Name and Password Click Add and then you can see the added terminal on the Devices interface Step 3 Adding Users 5 3 Users are bound with cards After you have added users to the Smart PSS you can configure users access permissions on the New Access See Figure 5 5 ...

Page 67: ...election Card types must be the same as card issuer types otherwise card numbers cannot be read On the Access interface click then click the IC or ID card icon and then select a card type There are two options ID Card and IC Card See Figure 5 6 and Figure 5 7 ...

Page 68: ...igure 5 6 Setting card type Figure 5 7 5 3 2 Adding One User You can add users one by one On the Access interface click then click and then enter user s information Click Finish to complete the user adding See Figure 5 8 and Figure 5 9 ...

Page 69: ...SmartPSS Configuration 63 Access Figure 5 8 Add user Figure 5 9 Adding Door Group 5 4 You can manage doors by grouping doors ...

Page 70: ...SmartPSS Configuration 64 On the Access interface click click Add enter door group name select a time zone Click Finish to complete the user adding See Figure 5 10 and Figure 5 11 Access Figure 5 10 ...

Page 71: ...r group access permission and user access permission Information of users who are given access permission in the Smart PSS and terminals will be synchronized 5 5 1 Giving Permission by Door Group Select a door group add users to the door list and then users on the door list get access permissions of all doors on the door list See Figure 5 12 and Figure 5 13 ...

Page 72: ...figuration 66 Access Figure 5 12 User select Figure 5 13 On the Access interface click click Add click Door Group Permission Step 1 Click Select user department in the Dropdown list or enter user ID Name and Step 2 ...

Page 73: ...und Click Finish to complete the configuration Step 3 Users without user ID cannot be found 5 5 2 Giving Permission by User ID You can give access permission to a user by selecting a user and then select door groups for the user See Figure 5 14 and Figure 5 15 Access Figure 5 14 ...

Page 74: ... 5 15 On the Access interface click Step 1 Click The Select Door Group interface is displayed Step 2 Select user department in the dropdown list or enter user ID Name and then select a Step 3 door list Click Finish to complete the configuration Step 4 ...

Page 75: ...ded to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your equipment network security 1 Physical Protection We suggest that you perform physical protection to equipment especially storage devices For example pla...

Page 76: ...ollowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up strong passwords 11 Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive we recommend that you use ...

Page 77: ...ds If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks ...

Reviews: