background image

Cybersecurity  Recommendations

   

VII 

 

 

Cybersecurity Recommendations 

Cybersecurity 

is more than just a buzzword: it’s something that pertains to every device that is 

connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 

steps toward protecting and strengthening networks and networked appliances will make them 

less susceptible to attacks. Below are some tips and recommendations on how to create a 

more secured security system. 

Mandatory actions to be taken for basic equipment network security 

1.

 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

-

 

The length should not be less than 8 characters; 

-

 

Include at least two types of characters; character types include upper and lower case 

letters, numbers and symbols; 

-

 

Do not contain the account name or the account name in reverse order; 

-

 

Do not use continuous characters, such as 123, abc, etc.; 

-

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.

 

Update Firmware and Client Software in Time 

-

 

According  to  the  standard  procedure  in  Tech-industry,  we  recommend  to  keep  your 

equipment  (such  as  NVR,  DVR,  IP  camera,  etc.)  firmware  up-to-date  to  ensure  the 

system is equipped with the latest security patches and fixes. When the equipment is 

connected  to  the  public  network,  it  is  recommended  to  enable  the 

“auto-check  for 

updates”  function  to  obtain  timely  information  of  firmware  updates  released  by  the 
manufacturer. 

-

 

We suggest that you download and use the latest version of client software. 

“Nice to have” recommendations to improve your equipment network security: 

1.

 

Physical Protection 

We  suggest  that  you  perform  physical  protection  to  equipment,  especially  storage  devices.  For 

example, place the equipment  in  a  special  computer room and cabinet, and  implement  well-done 

access  control  permission  and  key  management  to  prevent  unauthorized  personnel from  carrying 

out  physical  contacts  such  as  damaging  hardware,  unauthorized  connection  of  removable 

equipment (such as USB flash disk, serial port), etc. 

2.

 

Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 

cracked. 

3.

 

Set and Update Passwords Reset Information Timely   

The  equipment  supports  password  reset  function.  Please  set  up  related  information  for  password 

reset  in  time,  including  the  end  user’s  mailbox  and  password  protection  questions.  If  the 

information  changes,  please  modify  it  in  time.  When  setting  password  protection  questions,  it  is 

suggested not to use those that can be easily guessed. 

Summary of Contents for DH-TPC-BF5601N-B

Page 1: ...Thermal Network Bullet Camera Quick Start Guide V1 0 0...

Page 2: ...uide may cause harmful interference to radio communication For class A device these limits are designed to provide reasonable protection against harmful interference in a commercial environment Operat...

Page 3: ...Revision Content Release Date 1 V1 0 0 First release January 21 2019 Privacy Protection Notice As the device user or data controller you might collect personal data of others such as face fingerprint...

Page 4: ...am and supplementary documentation There still might be deviation in technical data functions and operations description or errors in print If there is any doubt or dispute please refer to our final e...

Page 5: ...power supply is correct before operating the device Use power supply conforming to SELV requirements and power the camera in the rated voltage conforming to Limited Power Source in IEC60950 1 And ref...

Page 6: ...dismantle the device there is no part which can be repaired by users themselves It may cause water leakage or bad image for the device if it is dismantled unprofessionally It is recommended to use the...

Page 7: ...trol cabinet Please cut off power before device maintenance and overhaul It is prohibited to open the cover with power on in the explosion environment Please make sure all the explosionproof component...

Page 8: ...e system is equipped with the latest security patches and fixes When the equipment is connected to the public network it is recommended to enable the auto check for updates function to obtain timely i...

Page 9: ...ons to them 10 Disable Unnecessary Services and Choose Secure Modes If not needed it is recommended to turn off some services such as SNMP SMTP UPnP etc to reduce risks If necessary it is highly recom...

Page 10: ...the intranet devices from external network The network should be partitioned and isolated according to the actual network needs If there are no communication requirements between two sub networks it...

Page 11: ...al Configuration 4 Initializing Camera 4 3 1 Modifying IP Address 5 3 2 Live Video 5 3 3 4 Installation 7 Cable Preparation 7 4 1 Installing Camera 8 4 2 4 2 1 Optional Installing SD Card 8 4 2 2 Fixi...

Page 12: ...Unpacking the Box 1 1 Unpacking the Box Refer to the following checklist and check the package If you find device damage or any loss contact the after sales service Checklist Figure 1 1...

Page 13: ...r more details about the cable function Table 2 1 Cable ports description SN Port Port Name Connector Function Description 1 AUDIO OUT Audio output port 3 5mm Jack port output audio signal to earphone...

Page 14: ...mage Please refer to Table 2 2 for introduction of I O port function Table 2 2 I O port description Port Color Cable port name Function description I O port Green ALARM_COM1 Alarm output common port U...

Page 15: ...by default and your PC s IP address are in the same network segment Open IE browser input camera default IP address in the address bar and then press Step 1 Enter The factory default IP address is 192...

Page 16: ...ect Setup Network TCP IP and the system will display the interface of TCP IP Step 2 which is shown in Figure 3 2 TCP IP Figure 3 2 Configure relevant info of IP address and click Save Step 3 Live Vide...

Page 17: ...to install plug in for the first system login please save and install plug in according to prompt The web interface will refresh automatically after plug in installation is completed then live video...

Page 18: ...0Ft 457M Selecting Needed Power Cable It is recommended to implement according to the following requirements when the users need to lengthen the power cable Max Transmission distance is recommended wh...

Page 19: ...card slot for reset hole Long press the reset button for 4 seconds 5 seconds and you will reset your Camera Please check if the waterproof ring is installed properly before closing the cover otherwise...

Page 20: ...4 2 2 Fixing Camera Fixing camera Figure 4 2 4 2 3 Connecting Cable Ports Refer to 2 2 Cable and connect each cable port to corresponding cables Then use the insulting tape to seal each port to preven...

Page 21: ...Installation 10 4 2 4 Installing Waterproof Connector Installing waterproof connector for network port Figure 4 3 4 2 5 Adjusting Sun Shield Cover Adjusting sun shield cover Figure 4 4...

Page 22: ...adjusting device direction and monitoring angle Tighten the adjusting screw firmly after adjustment is completed Please do not rotate the device body over 360 when the device body and mounting pedesta...

Page 23: ...tput in the alarm setup interface Step 4 and then click Save See Figure 5 1 for the Alarm interface Alarm input is corresponding to the alarm input port of device I O cable It is to set corresponding...

Page 24: ...Alarm 13 Alarm output port ALARM_OUT and ALARM_COM form a switch which can be used to provide alarm output Normally the switch is on and the switch will be off when there is alarm output Alarm output...

Page 25: ...the earth Open floor cable layout is forbidden In area of strong thunderstorm hit or near high sensitive voltage such as near high voltage transformer substation you need to install additional high po...

Reviews: