background image

 

22 

are using. 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7. 

Enable Whitelist

 

We suggest you to enable whitelist function to prevent everyone, except those with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus 

reducing the risk of ARP spoofing. 

9. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them. 

10. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 
●  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

●  SMTP: Choose TLS to access mailbox server. 
●  FTP: Choose SFTP, and set up strong passwords. 
●  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12. 

Secure Auditing

 

●  Check online users: we suggest that you check online users regularly to see if the 

device is logged in without authorization. 

●  Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13. 

Network Log

 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14. 

Construct a Safe Network Environment

 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 

recommend: 
●  Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

●  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to 

use VLAN, network GAP and other technologies to partition the network, so as to 

achieve the network isolation effect. 

●  Establish the 802.1x access authentication system to reduce the risk of unauthorized 

Summary of Contents for D-SD22204-GC-LB

Page 1: ...Network Speed Dome PTZ Camera Installation Manual V1 0 0...

Page 2: ...Manual The manual is for reference only If there is inconsistency between the manual and the actual product the actual product shall prevail We are not liable for any loss caused by the operations th...

Page 3: ...r respective owners Please visit our website contact the supplier or customer service if there is any problem occurred when using the Camera If there is any uncertainty or controversy please refer to...

Page 4: ...Device otherwise it might cause fire short circuit or other damage Avoid sea water or rain eroding the Device Avoid the lens aiming at intense light source including sunlight and incandescent light ot...

Page 5: ...ct your local retailer or customer service center Cleaning Requirements Clean the enclosure with soft cloth To remove the dirt you can dip the soft cloth in proper detergent wring the soft cloth out a...

Page 6: ...on 5 2 2 1 Alarm Cable Connection 5 2 2 2 Thunder Proof Cable Connection 6 2 2 2 1 Outdoor 6 2 2 2 2 Indoor 8 3 RS 485 Cable 10 3 1 Basic Features 10 3 2 Common Issues in Use 10 3 3 FAQ on RS 485 Cabl...

Page 7: ...the place where the Device is installed can sustain at least 4 times the weight of the Device and its mounting accessories for speed domes make sure that the ceiling and wall can sustain 8 times the w...

Page 8: ...0bps 800 m The maximum transmission distance will be reduced in the following conditions When thinner communication cables are used the Device is used in places with intense electromagnetic interferen...

Page 9: ...3 1 3 3 2 PoE Power Cable Table 1 4 PoE power cable POE Specification Network Cable Specification AF CAT5E and network cables with higher standard AT HiPoE or BT...

Page 10: ...ideo cable audio cable RS 485 control cable alarm cable network cable and optical fiber cable For details see Figure 2 1 The cables of different models vary and the actual product shall prevail The ma...

Page 11: ...rm input 6 Yellow black Alarm input 7 2 2 Cable Connection 2 2 1 Alarm Cable Connection Step 1 Connect the alarm input device to ALARM_IN and ALARM_GND of the user cable Step 2 Connect alarm output de...

Page 12: ...l tube and then do equipotential grounding to both ends of steel tubes Laying overhead power cables are prohibited At places with severe thunderstorms and induced voltage like substation you need to p...

Page 13: ...ightning protection devices outdoors No Description 1 Video lightning conductor 2 Communication lightning conductor 3 Power supply lighting conductor 4 Impedance of the cable connected to the groundin...

Page 14: ...uctor L2 The length of the rail that holds the Device H The length of the lightning conductor To get the value of L1 you need to use the formula 2 2 2 2 Indoor You shall use multiple copper cables who...

Page 15: ...9 Figure 2 4 Installing lightning protection devices indoors Table 2 3 Installing lightning protection devices indoors No Name 1 Yellow green grounding cable 2 Indoor equipotential grounding terminal...

Page 16: ...wo devices whose cable length is the longest among all the devices in Figure 3 1 cable length between 1 and 15 is the longest However this connection manner does not comply with the RS 485 industrial...

Page 17: ...electrode of RS 485 cable are misconnected Connect cables to the positive electrode and negative electrode correctly Loose connection Connect the cables firmly RS 485 cable is broken Replace RS 485 ca...

Page 18: ...king channel shall prevail Transmission performance At open places without interference if the Device is installed at least 1 5 m above the ground the effective communication distance is 100 m In the...

Page 19: ...oot m Table 5 1 Cable diameter 24V AC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmi...

Page 20: ...smission distance is foot m Table 6 1 Cable diameter 12V DC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance...

Page 21: ...ameter 24V DC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter...

Page 22: ...ssion Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 1357 414 2120 646 3313 1010 8481 2585 10...

Page 23: ...Diameter 1 25 Transmission Distance Diameter 2 00 120 57 17 88 27 138 42 353 108 130 52 16 82 25 127 39 326 99 140 48 15 76 23 118 36 303 92 150 45 14 71 22 110 34 283 86 160 42 13 66 20 104 32 265 8...

Page 24: ...mission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 2290 698 3578 1091 5591 1704 14312 4362 10 1145 349 1789 54...

Page 25: ...istance Diameter 1 25 Transmission Distance Diameter 2 00 130 88 27 138 42 215 66 550 168 140 82 25 128 39 200 61 511 156 150 76 23 119 36 186 57 477 145 160 72 22 112 34 175 53 447 136 170 67 20 105...

Page 26: ...950 0 130 36 39 0 01327 0 140 35 0 01539 0 160 34 37 0 02011 0 180 33 0 02545 0 200 32 35 0 03142 0 230 31 0 04115 0 250 30 33 0 04909 0 290 29 31 0 06605 0 330 28 30 0 08553 0 350 27 29 0 09621 0 400...

Page 27: ...er We suggest that you download and use the latest version of client software Nice to have recommendations to improve your equipment network security 1 Physical Protection We suggest that you perform...

Page 28: ...audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission Rem...

Page 29: ...23 access to private networks...

Reviews: