background image

User’s Manual   

10 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 

5. 

Change Default HTTP and Other Service Ports

 

We suggest you to change default HTTP and other service ports into any set of numbers 
between 1024–65535, reducing the risk of outsiders being able to guess which ports you 
are using. 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure 
communication channel. 

7. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the device, thus 
reducing the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., 
to reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to 
the following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords.   

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that 
you use encrypted transmission function, to reduce the risk of audio and video data being 
stolen during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing

 

  Check online users: we suggest that you check online users regularly to see if the device 

is logged in without authorization.   

  Check device log: By viewing the logs, you can know the IP addresses that were used to 

log in to your devices and their key operations. 

12. 

Network Log

 

Due to the limited storage capacity of the device, the stored log is limited. If you need to 
save the log for a long time, it is recommended that you enable the network log function to 
ensure that the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment

 

Summary of Contents for DHI-ARD822-W2

Page 1: ...Wireless Panic Button User s Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 0...

Page 2: ...if not avoided could result in property damage data loss reductions in performance or unpredictable results TIPS Provides methods to help you solve a problem or save time NOTE Provides additional info...

Page 3: ...ge without prior written notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and suppleme...

Page 4: ...ements Connect the device to the adapter before power on Strictly abide by local electrical safety standards and make sure that the voltage in the area is steady and conforms to the power requirements...

Page 5: ...nd Warnings III 1 Introduction 1 1 1 Overview 1 1 2 Technical Specifications 1 2 Checklist 3 3 Appearance 4 4 Adding the Button to the Hub 5 5 Installation 6 6 Configuration 7 6 1 Viewing Status 7 6 2...

Page 6: ...e ones that correspond with your model Table 1 1 Technical specifications Type Parameter Description Function Indicator Light 1 for multiple statuses pairing communication and more Button 1 Remote Upd...

Page 7: ...ions 55 mm 36 mm 14 2 mm 2 17 1 42 0 56 L W H Packaging Dimensions 95 mm 59 5 mm 30 5 mm 3 74 2 34 1 20 L W H Installation Wall mount handheld Net Weight 18 g 0 04 lb Gross Weight 48 g 0 11 lb Certifi...

Page 8: ...hecklist Figure 2 1 Checklist Table 2 1 Checklist No Item Name Quantit y No Item Name Quantity 1 Panic button 1 4 Bracket Optional 1 2 Quick start guide 1 5 Screw package Optional 1 3 Legal and regula...

Page 9: ...r once and then the button sends alarm messages to the hub Flashes green once Sending messages to the hub Flashes green for 0 5 seconds Successfully sent messages to the hub Flashes red for 0 5 second...

Page 10: ...that the hub has a stable internet connection Make sure that the hub is disarmed Step 1 Go to the hub screen and then tap to add the button Step 2 Tap to scan the QR code at the bottom of the panic b...

Page 11: ...tton supports wall mount and can be handheld This section uses wall mount as an example You need to buy a bracket to install the button Figure 5 1 Installation Step 1 Drill 2 holes in the wall accordi...

Page 12: ...r later and the button is V1 000 0000001 0 R 20211203 or later Battery Level The battery level of the button Fully charged Sufficient Moderate Insufficient Low Operation Mode The working mode of the b...

Page 13: ...ub and alert with siren Alarm video Linkage When an alarm is triggered the accessories will report the alarm events to the hub and then will link events Video Channel Select the video channel as neede...

Page 14: ...ystem is equipped with the latest security patches and fixes When the device is connected to the public network it is recommended to enable the auto check for updates function to obtain timely informa...

Page 15: ...cessary it is highly recommended that you use safe modes including but not limited to the following services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMT...

Page 16: ...on requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish the 802 1x acce...

Page 17: ...User s Manual...

Page 18: ...l t a en d ti a a u l n c e are m a d t a e riale n u p e i s e t rd e e e ri vita d t e date performante mai s zute sau rezultate imprevizibile OO SFATURI Ofera metode care sa va ajute sa rezolvati...

Reviews: