background image

 

27 

 

Cybersecurity Recommendations 

Appendix 3

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps 
toward protecting and strengthening networks and networked appliances will make them less 
susceptible to attacks. Below are some tips and recommendations on how to create a more secured 
security system. 

Mandatory actions to be taken for basic device network security: 

1.

 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 
letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.

 

Update Firmware and Client Software in Time 

 

According to the standard procedure in Tech-industry, we recommend to keep your device 
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped 
with the latest security patches and fixes. When the device is connected to the public 
network, it is recommended to enable the "auto-check for updates" function to obtain 
timely information of firmware updates released by the manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your device network security: 

1.

 

Physical Protection 

We suggest that you perform physical protection to device, especially storage devices. For 
example, place the device in a special computer room and cabinet, and implement well-done 
access control permission and key management to prevent unauthorized personnel from 
carrying out physical contacts such as damaging hardware, unauthorized connection of 
removable device (such as USB flash disk, serial port), etc. 

2.

 

Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3.

 

Set and Update Passwords Reset Information Timely   

The device supports password reset function. Please set up related information for password 
reset in time, including the end user’s mailbox and password protection questions. If the 
information changes, please modify it in time. When setting password protection questions, it is 
suggested not to use those that can be easily guessed. 

4.

 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 

5.

 

Change Default HTTP and Other Service Ports 

Summary of Contents for DHI-ASGG520T

Page 1: ...Lai de Tripod Turnstile User s Manual V1 0 1...

Page 2: ...al information as the emphasis and supplement to the text Revision History Version Revision content Release Time V1 0 1 Updated networking figure June 2021 V1 0 0 First release May 2021 Privacy Protec...

Page 3: ...oduct and the manual Please contact customer service for the latest program and supplementary documentation There might be errors in the print or deviations in the description of the functions operati...

Page 4: ...installed near places like a swimming pool entrance 50 km away from the sea construction sites and more then the stainless cover must be maintained more frequently Do not use paint thinner or any oth...

Page 5: ...owed if it is a red cross passing is not allowed The turnstile supports anti trailing and anti reverse intrusion functions If you force your way into the passage the turnstile will lock the arms which...

Page 6: ...ccess Controller 13 5 Cable Connection 15 Control Board Port Description 15 5 1 Control Board Cable Connection 16 5 2 5 2 1 For Two IC Card Readers and One Access Controller 17 5 2 2 For Two IC Card R...

Page 7: ...VI Appendix 2 1 Rust and Adhesive Failure Prevention 25 Appendix 2 2 Removing Marks and Rust 25 Appendix 2 3 Cautions 26 Cybersecurity Recommendations 27 Appendix 3...

Page 8: ...n access controller 2 required Features 1 3 Supports anti collision Supports setting passing time The arms will be locked automatically if no one enters the turnstile after the specified time The lock...

Page 9: ...an set the passing mode based on the direction people enter or exit the controlled area People can pass the turnstile using a card or their face People can pass the turnstile freely without identity v...

Page 10: ...1 2 Application Cards and faces are collected and imported to turnstiles through the network Application Figure 2 1...

Page 11: ...2 3 Structure Appearance 3 1 Appearance 1 Figure 3 1 Appearance 2 Figure 3 2...

Page 12: ...3 Dimensions 3 2 Dimensions mm inch Figure 3 3 Inner Components 3 3 Inner components Figure 3 4...

Page 13: ...Solid green arrow Stand by Flashes a green arrow Authorization successful The turnstile returns to standby mode when the person passed or it times out Flashes a red X 3 times and broadcasts Authorizat...

Page 14: ...ssary otherwise people injury or property damage might occur Firmly attach the turnstile Make sure that the ground cable works properly before powering on the turnstile Before making the turnstile ope...

Page 15: ...o drill a hole first apply cooling water and then keep drilling until the hole is deep enough Remove the dust inside the hole with water and then use the percussion drill for the dimensions you need 4...

Page 16: ...ncrete base 3 Power cable pipe 4 Signal cable pipe 5 Communication cable pipe 6 Signal and communication cables are connected to the security booth For needed cables and their specification see the fi...

Page 17: ...e face recognition access controller Reserve 3 m of the cable outside the cable entry Two Cat5 Ethernet cables for two card readers and two face recognition access controllers Reserve 3 m of each cabl...

Page 18: ...ss than 60 mm and no more than 100 mm Adjust it according to the actual situation This is for maintenance purposes and not for allowing people to pass through Install turnstiles next to buildings Figu...

Page 19: ...on Item Dimension Expansion bolt M12 120 Hole depth 95 mm Hole diameter 16 mm Use compressed air to remove the dust in the holes Repeat this step no less than three Step 5 times Hammer the expansion b...

Page 20: ...its position overlap the holes on the turnstile with Step 3 the expansion bolts and then place the turnstile on the ground Use gaskets to level the turnstile Step 4 Mark three evenly separated points...

Page 21: ...ithin deviation Align the turnstiles within deviation mm inch Figure 4 12 4 3 3 Fixing the Turnstiles After adjusting the turnstile position put an M12 flat gasket M12 spring gasket and an M12 Step 1...

Page 22: ...complete The turnstile works normally during commissioning See 6 Commissioning Power off the turnstile Only simple brackets and converters of the face recognition module need to have holes drilled on...

Page 23: ...14 Drill a hole on the mark with the diameter shown above Step 3 Use a file to clean off the burrs around the hole and remove the iron dust inside the turnstile Step 4 Install and fix the face recogn...

Page 24: ...VIN 24 V DC 6 5 A power input for control board 2 LD LD Providing operating voltage for card reader or face recognition module 3 RD RD 4 COM1 NO1 Entry signal Both relay outputs can be set to the alar...

Page 25: ...is received the turnstile arm automatically falls down To power on the turnstile you need to manually push the arm down and then lift it up to a level position 9 TMP1 GND Reserved port 12 V GND Provi...

Page 26: ...17 5 2 1 For Two IC Card Readers and One Access Controller Cable connection for two IC card readers and one access controller Figure 5 2...

Page 27: ...18 5 2 2 For Two IC Card Readers and One ASI7 8 Series Face Recognition Access Controller Cable connection for two IC card readers and one ASI7 8 series face recognition access controller Figure 5 3...

Page 28: ...19 5 2 3 For Two IC Card Readers and Two ASI7 8 Series Face Recognition Access Controllers Cable connection for two IC card readers and two ASI7 8 series face recognition access controllers Figure 5 4...

Page 29: ...ons description SW1 1 Description 0 Normal mode 1 Test mode 6 1 2 Setting Memory Mode Set memory mode through the DIP switch or the configuration application Table 6 2 Buttons description SW1 2 Descri...

Page 30: ...n 0 0 5 s default 0 1 10 s 1 0 30 s 1 1 60 s Setting Turnstile Type Set the turnstile type to tripod through the configuration application Restoring to factory settings will not result in data loss Se...

Page 31: ...automatically after people pass Check whether the electromagnetic chuck works properly and the turnstile arms fall normally when powered off After issuing card or granting face permissions run the tu...

Page 32: ...y configured through the configuration application The direction indicator is not on Check whether the cables of the direction indicator are correctly connected The arms are not folded after the turns...

Page 33: ...pads to clean the rust first you can also use rust remover at the same time and then use a piece of soft cloth soaked in a neutral detergent or clean water to clean the surface and arms of the turnsti...

Page 34: ...ays direct sunlight heat and pressure to avoid adhesive failure After installing a face recognition access controller apply silicon sealant to the installation hole to prevent water leakage and reappl...

Page 35: ...r supply before cleaning the turnstile Make sure that water cannot make contact with the components inside The detergent you use must not contain abrasive matter otherwise the turnstile surface will b...

Page 36: ...ates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to i...

Page 37: ...ve we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmi...

Page 38: ...29 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device...

Page 39: ......

Reviews: