background image

 

21 

Appendix 1 Cybersecurity Recommendations 

Mandatory actions to be taken for basic equipment network security:

 

1. 

Use Strong Passwords

 

Please refer to the following suggestions to set passwords: 

  The length should not be less than 8 characters. 

  Include at least two types of characters; character types include upper and lower case letters, 

numbers and symbols. 

  Do not contain the account name or the account name in reverse order. 

  Do not use continuous characters, such as 123, abc, etc. 

  Do not use overlapped characters, such as 111, aaa, etc. 

2. 

Update Firmware and Client Software in Time

 

  According to the standard procedure in Tech-industry, we recommend to keep your 

equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is 
equipped with the latest security patches and fixes. When the equipment is connected to the 
public network, it is recommended to enable the“auto-check for updates” function to obtain 
timely information of firmware updates released by the manufacturer. 

  We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your equipment network security:

 

1. 

Physical Protection

 

We suggest that you perform physical protection to equipment, especially storage devices. For 
example, place the equipment in a special computer room and cabinet, and implement 
well-done access control permission and key management to prevent unauthorized personnel 
from carrying out physical contacts such as damaging hardware, unauthorized connection of 
removable equipment (such as USB flash disk, serial port), etc. 

2. 

Change Passwords Regularly

 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3. 

Set and Update Passwords Reset Information Timely

 

The device supports password reset function. Please set up related information for password 
reset in time, including the end user’s mailbox and password protection questions. If the 
information changes, please modify it in time. When setting password protection questions, it is 
suggested not to use those that can be easily guessed. 

4. 

Enable Account Lock

 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password several 
times, the corresponding account and the source IP address will be locked. 

5. 

Change Default HTTP and Other Service Ports

 

We suggest you to change default HTTP and other service ports into any set of numbers between 
1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus 

Summary of Contents for D-SD22204DB-GNY-W

Page 1: ...Network Speed Dome PTZ Camera Installation Manual V1 0 1...

Page 2: ...sult in property damage data loss reductions in performance or unpredictable results Electrostatic Sensitive Devices Indicates a device that is sensitive to electrostatic discharge Indicates dangerous...

Page 3: ...that are not in compliance with the manual The manual will be updated according to the latest laws and regulations of related jurisdictions For detailed information see the paper user s manual use ou...

Page 4: ...e short circuit or other damage Avoid sea water or rain eroding the Device Avoid the lens aiming at intense light source including sunlight and incandescent light otherwise the lens might be damaged I...

Page 5: ...ct your local retailer or customer service center Cleaning Requirements Clean the enclosure with soft cloth To remove the dirt you can dip the soft cloth in proper detergent wring the soft cloth out a...

Page 6: ...on 5 2 2 1 Alarm Cable Connection 5 2 2 2 Thunder Proof Cable Connection 6 2 2 2 1 Outdoor 6 2 2 2 2 Indoor 8 3 RS 485 Cable 10 3 1 Basic Features 10 3 2 Common Issues in Use 10 3 3 FAQ on RS 485 Cabl...

Page 7: ...e weight of the Device and its mounting accessories for speed domes make sure that the ceiling and wall can sustain 8 times the weight of the Device and its mounting accessories Do not install the Dev...

Page 8: ...00 bps 800 m The maximum transmission distance will be reduced in the following conditions When thinner communication cables are used the Device is used in places with intense electromagnetic interfer...

Page 9: ...3 1 3 3 2 PoE Power Cable Table 1 4 PoE power cable POE Specification Network Cable Specification AF CAT5E and network cables with higher standard AT HiPoE or BT...

Page 10: ...video cable audio cable RS 485 control cable alarm cable network cable and optical fiber cable For details see Figure 2 1 Cables might be different depending on the model The manual will introduce the...

Page 11: ...input 6 Yellow black Alarm input 7 2 2 Cable Connection 2 2 1 Alarm Cable Connection Step 1 Connect the alarm input device to ALARM_IN and ALARM_GND of the user cable Step 2 Connect alarm output devic...

Page 12: ...hermetic steel tube and then do equipotential grounding to both ends of steel tubes Laying overhead power cables are prohibited At places with severe thunderstorms and induced voltage like substation...

Page 13: ...lightning protection devices outdoors No Description 1 Video lightning conductor 2 Communication lightning conductor 3 Power supply lighting conductor 4 Impedance of the cable connected to the groundi...

Page 14: ...ductor L2 The length of the rail that holds the Device H The length of the lightning conductor To get the value of L1 you need to use the formula 2 2 2 2 Indoor You can use multiple copper cables whos...

Page 15: ...9 Figure 2 4 Installing lightning protection devices indoors Table 2 3 Installing lightning protection devices indoors No Name 1 Yellow green grounding cable 2 Indoor equipotential grounding terminal...

Page 16: ...wo devices whose cable length is the longest among all the devices in Figure 3 1 cable length between 1 and 15 is the longest However this connection manner does not comply with the RS 485 industrial...

Page 17: ...electrode of RS 485 cable are misconnected Connect cables to the positive electrode and negative electrode correctly Loose connection Connect the cables firmly RS 485 cable is broken Replace RS 485 ca...

Page 18: ...channel might be different depending on the model Transmission performance At open places without interference if the Device is installed at least 1 5 m above the ground the effective communication di...

Page 19: ...oot m Table 5 1 Cable diameter 24 VAC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmi...

Page 20: ...smission distance is foot m Table 6 1 Cable diameter 12 VDC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance...

Page 21: ...ameter 24 VDC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter...

Page 22: ...ssion Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 1357 414 2120 646 3313 1010 8481 2585 10...

Page 23: ...Diameter 1 25 Transmission Distance Diameter 2 00 120 57 17 88 27 138 42 353 108 130 52 16 82 25 127 39 326 99 140 48 15 76 23 118 36 303 92 150 45 14 71 22 110 34 283 86 160 42 13 66 20 104 32 265 8...

Page 24: ...mission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 2290 698 3578 1091 5591 1704 14312 4362 10 1145 349 1789 54...

Page 25: ...istance Diameter 1 25 Transmission Distance Diameter 2 00 130 88 27 138 42 215 66 550 168 140 82 25 128 39 200 61 511 156 150 76 23 119 36 186 57 477 145 160 72 22 112 34 175 53 447 136 170 67 20 105...

Page 26: ...950 0 130 36 39 0 01327 0 140 35 0 01539 0 160 34 37 0 02011 0 180 33 0 02545 0 200 32 35 0 03142 0 230 31 0 04115 0 250 30 33 0 04909 0 290 29 31 0 06605 0 330 28 30 0 08553 0 350 27 29 0 09621 0 400...

Page 27: ...room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized conn...

Page 28: ...we suggest that you check online users regularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in...

Reviews: