background image

 

13 

Appendix 1 Cybersecurity Recommendations 

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that 
is  connected  to  the  internet.  IP  video  surveillance  is  not  immune  to  cyber  risks,  but  taking 

basic  steps  toward  protecting  and  strengthening  networks  and  networked  appliances  will 

make them less susceptible to attacks. Below are some tips and recommendations on how to 

create a more secured security system. 

Mandatory actions to be taken for basic equipment network security: 

1.  Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower 

case letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.  Update Firmware and Client Software in Time 

 

According to the standard procedure in Tech-industry, we recommend to keep your 

equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the 

system is equipped with the latest security patches and fixes. When the equipment is 
connected to the public network, it is recommended to enable the “auto-check for 
updates” function to obtain timely information of firmware updates released by the 
manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your equipment network security: 

1.  Physical Protection 

We suggest that you perform physical protection to equipment, especially storage devices. 

For  example,  place  the  equipment  in  a  special  computer  room  and  cabinet,  and 

implement  well-done  access  control  permission  and  key  management  to  prevent 

unauthorized personnel from carrying out physical contacts such as damaging hardware, 

unauthorized  connection  of  removable  equipment  (such  as  USB  flash  disk,  serial  port), 

etc. 

2.  Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 

cracked. 

3.  Set and Update Passwords Reset Information Timely   

The  equipment  supports  password  reset  function.  Please  set  up  related  information  for 
password  reset  in  time,  including  the  end  user’s  mailbox  and  password  protection 
questions.  If  the  information  changes,  please  modify  it  in  time.  When  setting  password 

protection questions, it is suggested not to use those that can be easily guessed. 

4.  Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

5.  Change Default HTTP and Other Service Ports 

Summary of Contents for DSS7016D-S2

Page 1: ...DSS7016D S2 Quick Start Guide V1 0 0...

Page 2: ...lated regions For detailed information see the paper User s manual CD ROM QR code or our official website If there is inconsistency between paper User s manual and the electronic version the electroni...

Page 3: ...under the allowed humidity and temperature conditions Electrical Safety Improper battery use might result in fire explosion or inflammation When replacing battery make sure the same model is used Use...

Page 4: ...2 1 Front Panel 2 1 2 2 Rear Panel 3 1 3 Connecting Cables 4 2 Local Applications 5 2 1 Function Architecture 5 2 2 System Configuration 6 2 2 1 Basic Settings 6 2 2 2 Network Settings 6 2 3 Operation...

Page 5: ...ed pair 6 Mouse 1 USB 2 0 interface box packed 7 Terminal Board 1 bag 2 with 12 columns 2 with 8 columns 8 Panel Key 2 Universal for series product After confirming that the material and accessories a...

Page 6: ...ght flashes during disk reading 3 Alarm indicator light The blue light flashes when the server triggers an alarm 4 Network indicator light The blue light flashes when network is well connected 5 USB 2...

Page 7: ...efault port 4 SAS port Used to connect to expansion cabinet 5 eSATA port Supports eSATA device access 6 USB 3 0 port Two USB 3 0 ports for USB device access 7 Audio input or output port Blue RS 232 po...

Page 8: ...4 1 3 Connecting Cables Connect cables according to port introduction and then connect the server to power...

Page 9: ...Function Architecture The section introduces the local applications of the device See Figure 2 1 The local interface is displayed after the server is started See Figure 2 2 Figure 2 1 Local functions...

Page 10: ...p it the same as local time Date Format Date and time format of the local system Date Separator Time Format Device Name It is the current product mode name by default Standby Time Set the inactivity d...

Page 11: ...er one will automatically take over the job to ensure network stability Load balancing Multiple NICs share one IP and work at the same time to share the network load providing greater network capacity...

Page 12: ...ay preferred DNS server address and alternate DNS server address Subnet Mask Preferred DNS Default Gateway Alternate DNS 2 3 Operation Management 2 3 1 Operation Analysis View the status of platform s...

Page 13: ...9 Figure 2 6 Operation Analysis 2 Figure 2 7 Operation Analysis 3...

Page 14: ...pper and lower flow of physical network port HDD Detection Real time detection of disk capacity temperature I O load and health Environment Detection Real time detection of CPU temperature usage fan s...

Page 15: ...before reboot Shut down Save system data before shutting down Password Reset current password Reset Firewall Enable SSH 22 port to avoid whitelist configuration error of the Config System or access fa...

Page 16: ...age map database and security For details see User s Manual Enter http IP config in the address bar of browser to go to the Config System The login interface is displayed See Figure 3 1 Server default...

Page 17: ...s function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to impr...

Page 18: ...TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up strong passwords 11 Audio and Video Encrypted Transmission If your audio...

Page 19: ...LAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unauthorized acces...

Reviews: