Dahua IP Villa System Quick Start Manual Download Page 27

Cybersecurity  Recommendations

   

19

 

5. 

Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 
between 1024~65535, reducing the risk of outsiders being able to guess which ports you 
are using. 

6. 

Enable HTTPS 

We  suggest  you  to  enable  HTTPS,  so  that  you  visit  web  service  through  a  secure 
communication channel. 

7. 

Enable Whitelist 

We  suggest  you  to  enable  whitelist  function  to  prevent  everyone,  except  those  with 
specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8. 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the equipment, 
thus reducing the risk of ARP spoofing. 

9. 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

10. 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 
etc., to reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to 
the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11. 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 
you use encrypted transmission function, to reduce the risk of audio and video data being 
stolen during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12. 

Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the 
device is logged in without authorization. 

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 
used to log in to your devices and their key operations. 

13. 

Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 
to save the log for a long time, it is recommended that you enable the network log function 
to ensure that the critical logs are synchronized to the network log server for tracing. 

14. 

Construct a Safe Network Environment 

In  order  to  better  ensure  the  safety  of  equipment  and  reduce  potential  cyber  risks,  we 
recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 
devices from external network. 

Summary of Contents for IP Villa System

Page 1: ...IP Villa System Quick Start Guide V1 0 0...

Page 2: ...ted according to the latest laws and regulations of related regions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual...

Page 3: ...Foreword II If there is any uncertainty or controversy please refer to our final explanation...

Page 4: ...ids to prevent liquids from flowing into the device Install the device at well ventilated places do not block its ventilation opening Use the device only within rated input and output range Do not dis...

Page 5: ...ce Mount 2 2 1 2 Flush Mount 3 Electric Lock and Magnetic Door Lock 4 2 2 1 Electric Door Lock 4 2 2 2 Magnetic Door Lock 4 Indoor Monitor VTH Installation 5 2 3 1 Installing with 86 Box 5 2 3 2 Insta...

Page 6: ...tor After you have started a call this indicator will be on 4 Indicator During the communication this indicator will be on 5 Indicator When the door is unlocked this indicator will be on 6 Call button...

Page 7: ...witch quantity output EOC2 Two wire port EOC1 Two wire port 3 DOOR_BUTTON Unlock button DOOR_FEEDBACK Door contact feedback GND GROUND DOOR_NC Connected to access controller to control door locks DOOR...

Page 8: ...g call from an outdoor station VTO or during the call between an outdoor station VTO and an indoor monitor VTH or when you are watching real time videos by an outdoor station VTO press this key and th...

Page 9: ...Overview 1 Network Diagram Network diagram...

Page 10: ...e Power on again after troubleshooting Installation and commission shall be done by professionals Do not dismantle or repair arbitrarily in case of device failure Contact after sales department It is...

Page 11: ...e mounting box on the wall by screwing the four ST4 25 self tapping screws into the expansion screws Put the outdoor station VTO into the surface mount box Fix the outdoor station VTO to the surface m...

Page 12: ...onnect one end of the on off button to one end of the on off button of the outdoor station VTO and then connect the other end of the on off button to the GND of outdoor station VTO See Figure 2 3 Elec...

Page 13: ...Hang the indoor monitor VTH on the installation bracket Installing with 86 box 2 3 2 Installing with Desktop Bracket Install the device with bracket on the desktop which only applies to handset indoor...

Page 14: ...nfo and indoor monitor VTH info at web interface of every outdoor station VTO set indoor monitor VTH info network info and outdoor station VTO info on every indoor monitor VTH so that video and voice...

Page 15: ...or monitor VTH is initialized 2 4 1 2 Quick Configuration After the indoor monitor VTH is initialized the message Do you want to do quick configuration appears See Figure 2 8 Select quick configuratio...

Page 16: ...rface is displayed See Figure 2 10 Initialization of all intercoms must be done on the indoor monitor VTH otherwise the quick configuration might fail If no device is uninitialized tap Next to go to t...

Page 17: ...rface Tap Edit behind each device to do configurations Configure main VTH and Sub VTH There must be only one main VTH and one or more sub VTHs If there are no sub VTHs then you do not need to do sub V...

Page 18: ...tdoor stations VTO If there are no sub outdoor stations VTO then you do not need to do sub outdoor stations VTO configurations 1 Select an outdoor station VTO The VTO Config interface is displayed See...

Page 19: ...s VTH and outdoor stations VTO For configuration of outdoor station VTO and indoor station VTH see their quick start guide Function Verification 2 5 1 Calling Indoor Monitors VTH from Outdoor Stations...

Page 20: ...station or IPC are installed Here outdoor station VTO will be taken as an example Select Monitor Door The Door interface is displayed See Figure 2 16 Select an outdoor station VTO to watch monitoring...

Page 21: ...Installation and Configuration 13 Monitoring video...

Page 22: ...the villa outdoor monitor VTO there will be push message on your phone and you can talk to the visitor or unlock the door remotely on your phone Scan the following QR code to download and install the...

Page 23: ...need to add and then select Network The P2P interface is displayed See Figure 3 4 For VTO3211D select Household Setting Room No Management to get the QR code P2P Scan the QR code with your phone then...

Page 24: ...Tap Alarm Manager Subscribe and then subscribe the outdoor monitor VTO you need See Figure 3 6 Subscribe When someone is calling you from the subscribed villa outdoor monitor VTO there will be push m...

Page 25: ...Connecting Mobile Phone App 17 Push...

Page 26: ...enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice...

Page 27: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Page 28: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Reviews: