background image

User’s Manual 

5.

 

Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers between 
1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6.

 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7.

 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing 
the risk of ARP spoofing. 

8.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11.

 

Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the device is 
logged in without authorization. 

 

Check device log: By viewing the logs, you can know the IP addresses that were used to log 
in to your devices and their key operations. 

12.

 

Network Log 

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the 
log for a long time, it is recommended that you enable the network log function to ensure that 
the critical logs are synchronized to the network log server for tracing. 

13.

 

Construct a Safe Network Environment 

In order to better ensure the safety of device and reduce potential cyber risks, we recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet devices 
from external network. 

 

The network should be partitioned and isolated according to the actual network needs. If 
there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

Summary of Contents for DH-SP-PIXX

Page 1: ...DH SP PIXX User s Manual V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Page 2: ...unpredictable results TIPS Provides methods to help you solve a problem or save time NOTE Provides additional information as a supplement to the text Revision History Version Revision Content Release...

Page 3: ...t in some differences appearing between the actual product and the manual Please contact customer service for the latest program and supplementary documentation There might be errors in the print or d...

Page 4: ...he allowed humidity 95 RH and temperature range 10 to 50 Installation requirements WARNING To avoid electric shock to the human body or damage to the product please turn off the AC power supply before...

Page 5: ...om dripping into the computer and causing it to burn To avoid unnecessary damage to the product caused by frequent switching on and off wait at least 30 seconds before turning on the machine NOTE Plea...

Page 6: ...anual V Table of Contents Foreword I Important Safeguards and Warnings III 1 Summarize 1 2 Product Introduction 1 Product Configuration 1 IO interface 2 Cybersecurity Recommendations 4 Product Warrant...

Page 7: ...osing our products Before using your product please make sure your packaging is complete if there have been damaged or you find any shortage please contact your agency as soon as possible OPS X 1 Prod...

Page 8: ...ace Memory 2 x SO DIMM DDR4 3200 MHz Max 32GB Audio Realtek ALC897 HD Audio IC Front IO interface 1 x HDMI1 4 2 x USB3 1 1 x USB2 0 1 x Type C USB3 1 1 x RJ45 1 x Line out MIC In Two In One Connector...

Page 9: ...nsing 5 95 non condensing OS Support Windows10 Windows11 Linux Dimensions 119 x 180 x 30 mm IO interface Front IO interface Rear IO interface WIFI 1 2 WIFI BT antenna POWER BUTTON Power Switch Button...

Page 10: ...User s Manual 3 HDMI High definition multimedia display interface USB3 1 USB3 1 port LAN RJ 45 network interface USB2 0 USB2 0 port JAE 80PIN 80 pin extension port DC IN DC power interface...

Page 11: ...enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice...

Page 12: ...ypted Transmission If your audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stol...

Page 13: ...authorized access to private networks Enable IP MAC address filtering function to limit the range of hosts allowed to access the device More information Please visit Dahua official website security em...

Page 14: ...during the use of the product can ensure uninterrupted or error free normal operation Accessories such as documents product accessories installation accessories tools etc consumables such as packagin...

Page 15: ...User s Manual 8 Dahua Stock Customer Service official account Dahua Group s official WeChat account Dahua Group 400 hotline 400 672 8166 Dahua Group Service Email support dahuatech com...

Page 16: ...User s Manual...

Reviews: