background image

User's Manual 

22 

1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing 
the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords.   

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing

 

  Check online users: we suggest that you check online users regularly to see if the device is 

logged in without authorization.   

  Check device log: By viewing the logs, you can know the IP addresses that were used to log in 

to your devices and their key operations. 

12. 

Network Log

 

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the 
log for a long time, it is recommended that you enable the network log function to ensure that 
the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment

 

In order to better ensure the safety of device and reduce potential cyber risks, we recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

  Establish the 802.1x access authentication system to reduce the risk of unauthorized access to 

private networks. 

  Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 

Summary of Contents for DHI-ITARD-024MA-T4

Page 1: ...Multi target Speed Measuring Radar User s Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 0...

Page 2: ...tion Notice As the device user or data controller you might collect the personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local pr...

Page 3: ...ion of the functions operations and technical data If there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the...

Page 4: ...ion and maintenance must be performed by qualified professionals When using a laser beam device avoid exposing the surface of the Radar to laser beam radiation Do not install the Radar in an environme...

Page 5: ...ions Do not drop or splash liquid onto the Radar and make sure that there is no object filled with liquid on the Radar to prevent liquid from flowing into it Do not disassemble the Radar without profe...

Page 6: ...2 2 1 Appearance 2 2 2 Dimensions 2 3 Installing the Radar 3 3 1 Installation Requirements 3 3 2 Horizontal Angle and Pitch Angle 3 3 2 1 Horizontal Angle 3 3 2 2 Pitch Angle 4 3 3 Installation Proced...

Page 7: ...the Radar to measure and distinguish angles with higher accuracy In addition the Radar is equipped with advanced tracking algorithm The algorithm ensures that the Radar can measure the information of...

Page 8: ...User s Manual 2 2 Appearance and Structure 2 1 Appearance Figure 2 1 Radar appearance 2 2 Dimensions Figure 2 2 Dimensions...

Page 9: ...g boards Install the Radar at a height between 5 m and 8 m 3 2 Horizontal Angle and Pitch Angle 3 2 1 Horizontal Angle The horizontal angle is the angle between the normal of the Radar and the lanes I...

Page 10: ...and pitch angle based on the following table Table 3 1 Recommended pitch angle Trigger Distance Pitch angle H 4 m Pitch angle H 5 m Pitch angle H 6 m Pitch angle H 7 m Pitch angle H 8 m 20 m 6 0 7 5 9...

Page 11: ...the pitch angle by adjusting the location of the Radar bracket Step 3 Adjust the horizontal angle We recommend you make the Radar surface that emits beams face the middle part of the road This ensures...

Page 12: ...6 Figure 3 6 Radar installed at the side of the lanes 3 4 Wires and Indicator Lights Power cord Figure 3 7 Power cord Table 3 2 Wire description Wire color Description Red DC 12 V Black GND RS 485 Fig...

Page 13: ...The Radar has 2 indicator lights The red light is the power indicator and the green light is the signal indicator After the Radar is powered on the power indicator keeps on If the Radar is started as...

Page 14: ...ure of debugging the network port is the same as that of debugging the serial port and WI FI Step 1 Log in to the client click MainMenu and then click LineDevice Figure 4 1 Connect the Radar to the ne...

Page 15: ...ection method Step 3 Click Test to go to debugging mode You can modify Radar parameters only in debugging mode Figure 4 3 Go to debugging mode Step 4 Set RoadLength The configured road length is irrel...

Page 16: ...User s Manual 10 Figure 4 4 Set the road length Step 5 Select Track to display the moving track of targets...

Page 17: ...User s Manual 11 Figure 4 5 Display the moving track of targets Step 6 Click Simulate In the SimulateCar dialog box set parameters to simulate vehicle passing The function is not enabled by default...

Page 18: ...User s Manual 12 Figure 4 6 Simulate vehicle passing Step 7 Click SetRoad In the RoadInformation dialog box set the following parameters...

Page 19: ...e Going Double The road direction Maximum The maximum reported speed of captured targets If you set the maximum reported speed to 180 km h the reported speed of any captured target is 180 km h even if...

Page 20: ...x set the following parameters Figure 4 8 Installation Table 4 2 Installation parameters Parameter Description Horizontal Offset The horizontal offset The default value is 0 If you want to move target...

Page 21: ...s Step 10 Click IPSetting In the Network dialog box set IP NetMask and GateWay and then click Operate Figure 4 10 Set network information Step 11 Click WiFi Password In the WiFi Password Setting dialo...

Page 22: ...btain the serial number of the Radar and the version number of the software Figure 4 12 Obtain version information Step 13 Click Restore to restore the default settings except for the network informat...

Page 23: ...nd you use measuring mode when RS 485 is connected to the host computer Figure 4 15 Enable measuring mode Step 16 Click Once Touch to start capturing targets Figure 4 16 Start capturing targets 4 2 Up...

Page 24: ...User s Manual 18 Figure 4 17 Select and upgrade a firmware...

Page 25: ...hether the Radar is powered off restarted or updated If yes reconnect the Radar to the network Check whether the network is unstable If yes improve the network and then reconnect the Radar to the netw...

Page 26: ...ehicles are not captured when vehicles pass Check whether the Radar faces the middle part of the monitored area Check whether the pitch angle is within an appropriate range Check whether the trigger d...

Page 27: ...rmation of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security...

Page 28: ...dio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check onli...

Page 29: ...User s Manual 23 device More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations...

Page 30: ...User s Manual...

Reviews: