background image

Cybersecurity  Recommendations

   

18

 

 

Cybersecurity Recommendations 

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 
steps toward protecting and strengthening networks and networked appliances will make them 
less  susceptible  to  attacks.  Below  are  some  tips  and  recommendations  on  how  to  create  a 
more secured security system. 

Mandatory actions to be taken for basic equipment network security: 

1. 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 
letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2. 

Update Firmware and Client Software in Time 

 

According to the standard procedure in Tech-industry, we recommend to keep your 
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the 
system is equipped with the latest security patches and fixes. When the equipment is 
connected to the public network, it is recommended to enable the “auto-check for 
updates” function to obtain timely information of firmware updates released by the 
manufacturer. 

 

We suggest that you download and use the latest version of client software. 

“Nice to have” recommendations to improve your equipment network security: 

1. 

Physical Protection 

We suggest that you perform physical protection to equipment, especially storage devices. 
For example, place the equipment in a special computer room and cabinet, and implement 
well-done  access  control  permission  and  key  management  to  prevent  unauthorized 
personnel from carrying out physical contacts such as damaging hardware, unauthorized 
connection of removable equipment (such as USB flash disk, serial port), etc. 

2. 

Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 
cracked. 

3. 

Set and Update Passwords Reset Information Timely   

The  equipment  supports  password  reset  function.  Please  set  up  related  information  for 
password  reset  in  time,  including  the  end  user’s  mailbox  and  password  protection 
questions.  If  the  information  changes,  please  modify  it  in  time.  When  setting  password 
protection questions, it is suggested not to use those that can be easily guessed. 

4. 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 

Summary of Contents for DHI-KTP01

Page 1: ...IP Villa System Quick Start Guide V1 0 0...

Page 2: ...ted according to the latest laws and regulations of related regions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual...

Page 3: ...Foreword II If there is any uncertainty or controversy please refer to our final explanation...

Page 4: ...ids to prevent liquids from flowing into the device Install the device at well ventilated places do not block its ventilation opening Use the device only within rated input and output range Do not dis...

Page 5: ...ce Mount 2 2 1 2 Flush Mount 3 Electric Lock and Magnetic Door Lock 4 2 2 1 Electric Door Lock 4 2 2 2 Magnetic Door Lock 4 Indoor Monitor VTH Installation 5 2 3 1 Installing with 86 Box 5 2 3 2 Insta...

Page 6: ...tor After you have started a call this indicator will be on 4 Indicator During the communication this indicator will be on 5 Indicator When the door is unlocked this indicator will be on 6 Call button...

Page 7: ...witch quantity output EOC2 Two wire port EOC1 Two wire port 3 DOOR_BUTTON Unlock button DOOR_FEEDBACK Door contact feedback GND GROUND DOOR_NC Connected to access controller to control door locks DOOR...

Page 8: ...g call from an outdoor station VTO or during the call between an outdoor station VTO and an indoor monitor VTH or when you are watching real time videos by an outdoor station VTO press this key and th...

Page 9: ...Overview 1 Network Diagram Network diagram...

Page 10: ...e Power on again after troubleshooting Installation and commission shall be done by professionals Do not dismantle or repair arbitrarily in case of device failure Contact after sales department It is...

Page 11: ...e mounting box on the wall by screwing the four ST4 25 self tapping screws into the expansion screws Put the outdoor station VTO into the surface mount box Fix the outdoor station VTO to the surface m...

Page 12: ...onnect one end of the on off button to one end of the on off button of the outdoor station VTO and then connect the other end of the on off button to the GND of outdoor station VTO See Figure 2 3 Elec...

Page 13: ...Hang the indoor monitor VTH on the installation bracket Installing with 86 box 2 3 2 Installing with Desktop Bracket Install the device with bracket on the desktop which only applies to handset indoor...

Page 14: ...nfo and indoor monitor VTH info at web interface of every outdoor station VTO set indoor monitor VTH info network info and outdoor station VTO info on every indoor monitor VTH so that video and voice...

Page 15: ...or monitor VTH is initialized 2 4 1 2 Quick Configuration After the indoor monitor VTH is initialized the message Do you want to do quick configuration appears See Figure 2 8 Select quick configuratio...

Page 16: ...rface is displayed See Figure 2 10 Initialization of all intercoms must be done on the indoor monitor VTH otherwise the quick configuration might fail If no device is uninitialized tap Next to go to t...

Page 17: ...rface Tap Edit behind each device to do configurations Configure main VTH and Sub VTH There must be only one main VTH and one or more sub VTHs If there are no sub VTHs then you do not need to do sub V...

Page 18: ...tdoor stations VTO If there are no sub outdoor stations VTO then you do not need to do sub outdoor stations VTO configurations 1 Select an outdoor station VTO The VTO Config interface is displayed See...

Page 19: ...s VTH and outdoor stations VTO For configuration of outdoor station VTO and indoor station VTH see their quick start guide Function Verification 2 5 1 Calling Indoor Monitors VTH from Outdoor Stations...

Page 20: ...station or IPC are installed Here outdoor station VTO will be taken as an example Select Monitor Door The Door interface is displayed See Figure 2 16 Select an outdoor station VTO to watch monitoring...

Page 21: ...Installation and Configuration 13 Monitoring video...

Page 22: ...the villa outdoor monitor VTO there will be push message on your phone and you can talk to the visitor or unlock the door remotely on your phone Scan the following QR code to download and install the...

Page 23: ...need to add and then select Network The P2P interface is displayed See Figure 3 4 For VTO3211D select Household Setting Room No Management to get the QR code P2P Scan the QR code with your phone then...

Page 24: ...Tap Alarm Manager Subscribe and then subscribe the outdoor monitor VTO you need See Figure 3 6 Subscribe When someone is calling you from the subscribed villa outdoor monitor VTO there will be push m...

Page 25: ...Connecting Mobile Phone App 17 Push...

Page 26: ...enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice...

Page 27: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Page 28: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Reviews: