background image

 

16 

reducing the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 

 

If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords.   

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 

 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing

 

  Check online users: we suggest that you check online users regularly to see if the device is 

logged in without authorization.   

  Check equipment log: By viewing the logs, you can know the IP addresses that were used to 

log in to your devices and their key operations. 

12. 

Network Log

 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to 
save the log for a long time, it is recommended that you enable the network log function to 
ensure that the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment

 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 
recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

  Establish the 802.1x access authentication system to reduce the risk of unauthorized access to 

private networks. 

  Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 

device. 

Summary of Contents for DHI-ASA3223A-W

Page 1: ...Face Recognition Time Attendance Quick Start Guide V1 0 0...

Page 2: ...r data controller you might collect the personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regula...

Page 3: ...there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks...

Page 4: ...f the battery might result in a fire or explosion Personnel working at heights must take all necessary measures to ensure personal safety including wearing a helmet and safety belts Do not place the T...

Page 5: ...ge of power input and output Use the Time Attendance under allowed humidity and temperature conditions Do not drop or splash liquid onto the Time Attendance and make sure that there is no object fille...

Page 6: ...Installation Process 3 2 2 1 Wall mount 3 2 2 2 86 Box Mount 4 2 2 3 Table Mount 5 3 Local Configurations 6 3 1 Initialization 6 3 2 Adding New Users 6 4 Logging in to the Webpage 9 Appendix 1 Import...

Page 7: ...1 1 Structure The front appearance might differ depending on different models of the Time Attendance Here we take the fingerprint model as an example Figure 1 1 Structure Unit mm inch...

Page 8: ...Attendance should be no less than 100 lux We recommend you install the indoors at least 3 meters away from windows and doors and 2 meters away from the light source Avoid backlight direct sunlight cl...

Page 9: ...n method This section takes fingerprint model of Time Attendance as an example 2 2 1 Wall mount Step 1 According the position of the holes in the installation bracket drill 3 holes in the wall Put exp...

Page 10: ...wall at an appropriate height Step 2 Fasten the installation bracket to the 86 box with 2 screws Step 3 Wire the Time Attendance Step 4 Fix the Time Attendance on the bracket Step 5 Screw in 1 screw...

Page 11: ...e Mount Step 1 Pass the wire through the opening of the bracket and then connect the wire to the Time Attendance Step 2 Snap the Time Attendance on the bracket and slide it down the bracket Figure 2 7...

Page 12: ...Initialization If you forget the administrator password send a reset request to your linked e mail address The password must consist of 8 to 32 non blank characters and contain at least two types of...

Page 13: ...Parameter Description User ID Enter the user ID The ID can be numbers letters and their combinations and the maximum length of the user ID is 32 characters Each ID is unique Name Enter the username a...

Page 14: ...register up to five cards Enter your card number or swipe your card and then the card information will be read by the Time Attendance You can set the registered card as the duress card and then an al...

Page 15: ...Attendance support network connection Procedure Step 1 Open a web browser go to the IP address of the Time Attendance You can use IE11 Firefox or Chrome Step 2 Enter the user name and password Figure...

Page 16: ...y Press your finger on the center of the fingerprint scanner Do not put the fingerprint sensor in a place with intense light high temperature and high humidity If your fingerprints are unclear use oth...

Page 17: ...11 How to Press Your Fingerprint on the Scanner Appendix Figure 1 2 Correct placement Appendix Figure 1 3 Wrong placement...

Page 18: ...otherwise backlight and direct sunlight might influence face recognition performance of the Time Attendance During Registration You can register faces through the device or through the platform For re...

Page 19: ...ir Do not wear glasses hats heavy beards or other face ornaments that influence face image recording With eyes open without facial expressions and make your face toward the center of camera When recor...

Page 20: ...age resolution is within the range 150 300 pixels 600 1200 pixels image pixels are more than 500 500 pixels image size is less than 100 KB and image name and person ID are the same Make sure that the...

Page 21: ...room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized conn...

Page 22: ...we suggest that you check online users regularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in...

Reviews: