Dahua EEC300D8-N1 Quick Start Manual Download Page 22

 

18

 

 

Cybersecurity Recommendations 

Appendix 1

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps 
toward protecting and strengthening networks and networked appliances will make them less 
susceptible to attacks. Below are some tips and recommendations on how to create a more secured 
security system. 

Mandatory actions to be taken for basic device network security: 

1.

 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 
letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.

 

Update Firmware and Client Software in Time 

 

According to the standard procedure in Tech-industry, we recommend to keep your device 
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped 
with the latest security patches and fixes. When the device is connected to the public 
network, it is recommended to enable the “auto-check for updates” function to obtain 
timely information of firmware updates released by the manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your device network security: 

1.

 

Physical Protection 

We suggest that you perform physical protection to device, especially storage devices. For 
example, place the device in a special computer room and cabinet, and implement well-done 
access control permission and key management to prevent unauthorized personnel from 
carrying out physical contacts such as damaging hardware, unauthorized connection of 
removable device (such as USB flash disk, serial port), etc. 

2.

 

Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3.

 

Set and Update Passwords Reset Information Timely   

The device supports password reset function. Please set up related information for password 
reset in time, including the end user’s mailbox and password protection questions. If the 
information changes, please modify it in time. When setting password protection questions, it is 
suggested not to use those that can be easily guessed. 

4.

 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 

5.

 

Change Default HTTP and Other Service Ports 

Summary of Contents for EEC300D8-N1

Page 1: ...Data Collection Station Quick Start Guide V1 0 1...

Page 2: ...hazard which if not avoided could result in slight or moderate injury CAUTION Indicates a potential risk which if not avoided could result in property damage data loss lower performance or unpredictab...

Page 3: ...entilated place and do not block the ventilation of the Scanner Operate the Station within the rated range of power input and output Do not disassemble the Station Transport use and store the Station...

Page 4: ...1 3 Power on 6 1 4 Device Connection 6 1 5 1 5 1 Connecting Control Module and Data Collection Module 6 1 5 2 Connecting Body Camera and Data Collection Module 6 2 HDD Installation 10 3 Configuration...

Page 5: ...rol module can support 4 data collection modules at most It is featured with Recharge and collect data from maximum 32 body cameras at the same time Automatically or manually upgrade body cameras Auto...

Page 6: ...2 Product Appearance 1 2 1 2 1 Control Module Front panel and rear panel Figure 1 1...

Page 7: ...each user 4 Adjusting board Remove the control module when connecting control module and data collection modules 5 Rear cover 6 White light Provides extra light when recognizing faces Provides extra l...

Page 8: ...ntrol module and data collection modules 10 Heat dissipation hole 11 Ports Include power input port USB ports Ethernet ports and RS 232 port For details see Table 1 2 1 2 2 Appearance of Data Collecti...

Page 9: ...le 1 2 Port description No Name Description 1 Power input Inputs 100 V 240 V AC power for the Station After shutting down the Station the fan will work for a period to cool the Station 2 USB ports Con...

Page 10: ...tion module according to the instruction on the positioning map Step 3 1 5 2 Connecting Body Camera and Data Collection Module After starting the Station connect body cameras to the Station and then y...

Page 11: ...7 Take out data cable MPT220 slot Figure 1 5 Take out data cable MPT210 slot Figure 1 6 Connect the data cable to the body camera until the Station pops up connection successful Step 2 dialog box...

Page 12: ...put the body camera into the dock and then you can collect data and Step 3 recharge the body camera For MPT220 body camera insert the device into the slot For MPT210 body camera insert the clip into...

Page 13: ...9 Data collection MPT220 slot Figure 1 9 Data collection MPT210 slot Figure 1 10...

Page 14: ...ach HDD we recommend you to install at least 2 HDDs with the same capacity for data collection and recharging Loosen the screws on the rear cover and then remove the rear cover Step 1 Remove rear cove...

Page 15: ...s Step 4 Fix HDD Figure 2 4 Install HDDs Push the fixed HDDs in the HDD box Step 5 Install HDD Figure 2 5 Push HDDs in the direction as the HDD port and main board port show Fix the HDD box in the cha...

Page 16: ...12 Connect the cable between main board and HDD plate Step 7 Fix the cover Step 8 Fix the cover Figure 2 7...

Page 17: ...13 3 Configuration and Operation Main interface Figure 3 1 Table 3 1 Main interface description No Description 1 Unlock the dock by one tap 2 Alarm Tap it and the alarm tune is disabled...

Page 18: ...each data collection module 9 View update methods of the Station and body cameras Click Bind Enforce on the Device Info interface enter the enforcer name and enforcer No click Search and then select...

Page 19: ...15 User management Figure 3 2 Click Add to add users Step 2 You can add faces and fingerprints and configure user permissions All permissions are enabled by default Add users Figure 3 3...

Page 20: ...users Enter enforcer department enforcer No enforcer name password and confirm password and add face and fingerprint as needed Adding enforcer Figure 3 4 3 2 3 Resetting Password Select Setting Accou...

Page 21: ...17 Resetting password Figure 3 5...

Page 22: ...ates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to i...

Page 23: ...ve we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmi...

Page 24: ...20 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device...

Reviews: