background image

 

Cybersecurity  Recommendations

   

I

 

 

 

Cybersecurity Recommendations 

Mandatory actions to be taken towards cybersecurity

 

1. Change Passwords and Use Strong Passwords:

 

The number one reason systems get “hacked” is due to having weak or default passwords. It is 

recommended to change default passwords immediately and choose a strong password whenever 

possible. A strong password should be made up of at least 8 characters and a combination of special 

characters, numbers, and upper and lower case letters. 

2. Update Firmware

 

As is standard procedure in the tech-industry, we recommend keeping NVR, DVR, and IP camera 

firmware up-to-date to ensure the system is current with the latest security patches and fixes. 

“Nice to have” recommendations to improve your network security

 

1)  Change Passwords Regularly

 

Regularly change the credentials to your devices to help ensure that only authorized users are able to 

access the system. 

2)  Enable IP Filter 

Enabling your IP filter will prevent everyone, except those with specified IP addresses, from accessing 

the system. 

3)  Forward Only Ports You Have to Use 

As for the platform deployed inside the fire wall, it has to reduce the quantity of port mapping on the fire 

wall. It is recommended to only map the ports which have to be used by platform and other ports are 

prohibited. 

4)  UPnP 

 

UPnP will automatically try to forward ports in your router or modem. Normally this would be a good 

thing. However, if your system automatically forwards the ports and you leave the credentials 

defaulted, you may end up with unwanted visitors. 

 

If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should be 

turned off regardless. Disabling UPnP is recommended when the function is not used in real 

applications. 

5)  SNMP 

Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, for 

tracing and testing purposes only. 

6)  Multicast 

Multicast is used to share video streams between two recorders. Currently there are no known issues 

involving Multicast, but if you are not using this feature, deactivation can enhance your network security. 

7)  Physically Lock Down the Device 

Ideally, you want to prevent any unauthorized physical access to your system. The best way to achieve 

this is to install the recorder in a lockbox, locking server rack, or in a room that is behind a lock and key.

Summary of Contents for DSS4004-S2

Page 1: ...DSS4004S2 Quick Start Guide V1 0 1...

Page 2: ...to Use As for the platform deployed inside the fire wall it has to reduce the quantity of port mapping on the fire wall It is recommended to only map the ports which have to be used by platform and o...

Page 3: ...The network your NVR and IP camera resides on should not be the same network as your public computer network This will prevent any visitors or unwanted guests from getting access to the same network...

Page 4: ...Release Aug 1st 2018 2 V1 0 1 Add local application and delete initialization config Oct 25th 2018 Privacy Protection Notice As the device user or data controller you might collect personal data of ot...

Page 5: ...ase contact the customer service for the latest program and supplementary documentation There still might be deviation in technical data functions and operations description or errors in print If ther...

Page 6: ...Device under the allowed humidity and temperature conditions Electrical Safety Improper battery use might result in fire explosion or inflammation When replacing battery make sure the same model is u...

Page 7: ...klist 1 1 1 Package 1 1 2 Port Definition 1 1 2 1 Front Panel 2 1 2 2 Rear Panel 2 1 3 Device Installation 3 2 Local Application 4 2 1 Function Architecture 4 2 2 Business Config 5 2 2 1 Basic Setting...

Page 8: ...klist match actual product and are complete Actual accessories have no damage After you have checked that material and accessories are complete please well store them for emergency use Table 1 1 No Ch...

Page 9: ...the device the device is equipped with power status indicator blue normally on long press to shut it down 1 2 2 Rear Panel Figure 1 2 Table 1 3 No Port or Tag Definition 1 Alarm Output and Input Reser...

Page 10: ...Checklist 3 1 3 Device Installation Connect cable according to port introduction and then connect to power...

Page 11: ...Local Local Basic Basic Network Network Analysis Analysis System System Reboot Reboot Shut down Shut down Password Password Reset Reset Reset Firewall Reset Firewall Version Version Server Detection...

Page 12: ...me format of local application homepage and it is adjusted according to user experience Date Separator Time Format Device Name It is the current product mode name by default Supports customized Englis...

Page 13: ...Local Application 6 Network setting Figure 2 4 Basic setting parameter description Table 2 2 Parameter Note...

Page 14: ...k card bandwidth When one network card is abnormal it will distribute load to other available cards again and provide network reliability Link Aggregation Through network card binding and peripheral c...

Page 15: ...tatus of platform server such as normal stop and abnormal etc Network Detection Realizes real time detection of both upper and lower flow of physical network port HDD Detection Realizes real time dete...

Page 16: ...ata before shut it down It is forbidden to power off directly Password Reset the current password as initialization password for admin config system system FTP and database Reset Firewall Enable SSH 2...

Page 17: ...d alone environment Please log in config system for deeper configurations of service cluster storage linkage map database and security etc Please refer to server user s manual for more details Access...

Reviews: