Dahua D-TPC-BF5401-B35-BM-S2 Quick Start Manual Download Page 9

Cybersecurity  Recommendations

   

VIII 

4.

 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

5.

 

Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.

 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7.

 

Enable Whitelist   

We suggest you to enable whitelist function to prevent everyone, except those with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 

computer

’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.

 

MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment,  thus 

reducing the risk of ARP spoofing. 

9.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it  is  recommended  to  turn off  some  services  such as SNMP, SMTP, UPnP,  etc.,  to 

reduce risks. 

If  necessary,  it  is  highly  recommended  that  you  use  safe  modes,  including  but  not  limited  to  the 

following services: 

-

 

SNMP

Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

-

 

SMTP

Choose TLS to access mailbox server. 

-

 

FTP

Choose SFTP, and set up strong passwords.   

-

 

AP hotspot

Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.

 

Secure Auditing   

-

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization.   

-

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.

 

Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save 

the log for a long time, it is recommended that you enable the network log function to ensure that 

the critical logs are synchronized to the network log server for tracing. 

Summary of Contents for D-TPC-BF5401-B35-BM-S2

Page 1: ...Thermal Network Bullet Camera Quick Start Guide V1 0 1...

Page 2: ...uide may cause harmful interference to radio communication For class A device these limits are designed to provide reasonable protection against harmful interference in a commercial environment Operat...

Page 3: ...NOTE Provides additional information as the emphasis and supplement to the text Revision History No Version Revision Content Release Date 1 V1 0 1 Update screenshot and lightening and surge protectio...

Page 4: ...notice The product updates might cause some differences between the actual product and the Guide Please contact the customer service for the latest program and supplementary documentation There still...

Page 5: ...power supply is correct before operating the device Use power supply conforming to SELV requirements and power the camera in the rated voltage conforming to Limited Power Source in IEC60950 1 And ref...

Page 6: ...dismantle the device there is no part which can be repaired by users themselves It may cause water leakage or bad image for the device if it is dismantled unprofessionally It is recommended to use the...

Page 7: ...trol cabinet Please cut off power before device maintenance and overhaul It is prohibited to open the cover with power on in the explosion environment Please make sure all the explosionproof component...

Page 8: ...e system is equipped with the latest security patches and fixes When the equipment is connected to the public network it is recommended to enable the auto check for updates function to obtain timely i...

Page 9: ...ons to them 10 Disable Unnecessary Services and Choose Secure Modes If not needed it is recommended to turn off some services such as SNMP SMTP UPnP etc to reduce risks If necessary it is highly recom...

Page 10: ...the intranet devices from external network The network should be partitioned and isolated according to the actual network needs If there are no communication requirements between two sub networks it...

Page 11: ...al Configuration 4 Initializing Camera 4 3 1 Modifying IP Address 5 3 2 Live Video 5 3 3 4 Installation 7 Cable Preparation 7 4 1 Installing Camera 8 4 2 4 2 1 Optional Installing SD Card 8 4 2 2 Fixi...

Page 12: ...Unpacking the Box 1 1 Unpacking the Box Refer to the following checklist and check the package If you find device damage or any loss contact the after sales service Checklist Figure 1 1...

Page 13: ...r more details about the cable function Table 2 1 Cable ports description SN Port Port Name Connector Function Description 1 AUDIO OUT Audio output port 3 5mm Jack port output audio signal to earphone...

Page 14: ...mage Please refer to Table 2 2 for introduction of I O port function Table 2 2 I O port description Port Color Cable port name Function description I O port Green ALARM_COM1 Alarm output common port U...

Page 15: ...by default and your PC s IP address are in the same network segment Open IE browser input camera default IP address in the address bar and then press Step 1 Enter The factory default IP address is 192...

Page 16: ...ect Setup Network TCP IP and the system will display the interface of TCP IP Step 2 which is shown in Figure 3 2 TCP IP Figure 3 2 Configure relevant info of IP address and click Save Step 3 Live Vide...

Page 17: ...to install plug in for the first system login please save and install plug in according to prompt The web interface will refresh automatically after plug in installation is completed then live video...

Page 18: ...0Ft 457M Selecting Needed Power Cable It is recommended to implement according to the following requirements when the users need to lengthen the power cable Max Transmission distance is recommended wh...

Page 19: ...card slot for reset hole Long press the reset button for 4 seconds 5 seconds and you will reset your Camera Please check if the waterproof ring is installed properly before closing the cover otherwise...

Page 20: ...4 2 2 Fixing Camera Fixing camera Figure 4 2 4 2 3 Connecting Cable Ports Refer to 2 2 Cable and connect each cable port to corresponding cables Then use the insulting tape to seal each port to preven...

Page 21: ...Installation 10 4 2 4 Installing Waterproof Connector Installing waterproof connector for network port Figure 4 3 4 2 5 Adjusting Sun Shield Cover Adjusting sun shield cover Figure 4 4...

Page 22: ...adjusting device direction and monitoring angle Tighten the adjusting screw firmly after adjustment is completed Please do not rotate the device body over 360 when the device body and mounting pedesta...

Page 23: ...tput in the alarm setup interface Step 4 and then click Save See Figure 5 1 for the Alarm interface Alarm input is corresponding to the alarm input port of device I O cable It is to set corresponding...

Page 24: ...Alarm 13 Alarm output port ALARM_OUT and ALARM_COM form a switch which can be used to provide alarm output Normally the switch is on and the switch will be off when there is alarm output Alarm output...

Page 25: ...onnect the Camera s ground wire to the tower s ground wire And Make sure that the Camera is over 3 m away from the tower lightning rod s top point Use several strands of copper wire whose total diamet...

Page 26: ...Lightening and Surge Protection 15 Appendix figure 1 1 Lightening protection...

Reviews: