Dahua DH-NC1800 Quick Start Manual Download Page 14

User’s Manual 

Recommendation measures to enhance platform cyber security: 

1.

 

Enable Account Binding IP/MAC 

It is recommended to enable the account binding IP/MAC mechanism, and configure the 

IP/MAC of the terminal where the commonly used client is located as an allowlist to further 

improve access security. 

2.

 

Change Password Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3.

 

Turn On Account Lock Mechanism 

The account lock function is enabled by default at the factory, and it is recommended to keep it 

on to protect the security of your account. After the attacker has failed multiple password 

attempts, the corresponding account and source IP will be locked. 

4.

 

Reasonable Allocation of Accounts and Permissions 

According to business and management needs, reasonably add new users, and reasonably 

allocate a minimum set of permissions for them. 

5.

 

Close Non-essential Services and Restrict the Open Form of Essential Services 

If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445), 

remote desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH 

(port 22) under Linux. At the same time, close the database port to the outside or only open to a 

specific IP address, such as MySQL (port 3306), to reduce the risks faced by the platform. 

6.

 

Patch the Operating System/Third Party Components 

It is recommended to regularly detect security vulnerabilities in the operating system and 

third-party components, and apply official patches in time. 

7.

 

Security Audit 

 

Check online users: It is recommended to check online users irregularly to identify whether 

there are illegal users logging in. 

 

View the platform log: By viewing the log, you can get the IP information of the attempt to 

log in to the platform and the key operation information of the logged-in user. 

8.

 

The Establishment of a Secure Network Environment 

In order to better protect the security of the platform and reduce cyber security risks, it is 

recommended that: 

 

Follow the principle of minimization, restrict the ports that the platform maps externally by 

firewalls or routers, and only map ports that are necessary for services. 

 

Based on actual network requirements, separate networks: if there is no communication 

requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to 

divide the network to achieve the effect of network isolation. 

Summary of Contents for DH-NC1800

Page 1: ...802 11AX 1800 M Wireless Adapter DH NC1800 Quick Start Guide V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Page 2: ...l data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and inte...

Page 3: ...ion of the functions operations and technical data If there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the...

Page 4: ...allation Requirements WARNING Strictly abide by local electrical safety standards and make sure that the voltage in the area is steady and conforms to the power requirements of the device Do not expos...

Page 5: ...ting environment Temperature 0 to 40 32 F to 104 F Humidity 10 90 RH non condensing Maintenance Requirements Power off the device before maintenance Mark key components on the maintenance circuit diag...

Page 6: ...ling the wireless USB adapter Windows 10 supported 1 2 Connecting to Wi Fi network Windows 10 used as an example 3 Uninstalling the existing wireless adapter driver on your computer 5 Appendix 1 Addin...

Page 7: ...nstalling the existing wireless adapter driver on your computer Use the USB extension cable to connect the wireless USB adapter to the USB port of your Step 1 computer Connect the device Figure 1 1 Do...

Page 8: ...e click Setup exe and then install the wireless USB adapter according to the prompts Step 4 Double click Setup exe Figure 1 4 Wait a moment until the initialization finishes Now you can connect to the...

Page 9: ...corner of your screen select the desired Wi Fi network and Step 1 then click Connect Connect to Wi Fi network Figure 2 1 If the wireless network is encrypted enter its wireless password click Next an...

Page 10: ...User s Manual 4 Successfully connected to Wi Fi network Figure 2 3...

Page 11: ...uter Perform the following steps Windows 10 used as an example Click in the bottom left corner of your screen and then click Step 1 Appendix Figure 1 1 Click settings icon Click Apps Step 2 Appendix F...

Page 12: ...as an example Right click on your desktop and choose Personalize Step 1 Appendix Figure 2 1 Choose Personalize Select Themes from the left sidebar and then click Desktop icon settings Step 2 Appendix...

Page 13: ...egligence or other Dahua and its employees licensors or affiliates are not liable for compensation even if they have been notified of the possibility of such damage Some jurisdictions do not allow lim...

Page 14: ...ces under Windows and Telnet port 23 and SSH port 22 under Linux At the same time close the database port to the outside or only open to a specific IP address such as MySQL port 3306 to reduce the ris...

Page 15: ...User s Manual 9 More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations...

Page 16: ...User s Manual...

Reviews: