Dahua KTA02 Quick Start Manual Download Page 17

12 

We suggest you to change default HTTP and other service ports into any set of numbers 
between 1024~65535, reducing the risk of outsiders being able to guess which ports you 
are using. 

6. 

Enable HTTPS 

We  suggest  you  to  enable  HTTPS,  so  that  you  visit  Web  service  through  a  secure 
communication channel. 

7. 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the device, thus 
reducing the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 
etc., to reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to 
the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 
you use encrypted transmission function, to reduce the risk of audio and video data being 
stolen during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing 

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 
device is logged in without authorization. 

 

Check device log: By viewing the logs, you can know the IP addresses that were used 
to log in to your devices and their key operations. 

12. 

Network Log 

Due to the limited storage capacity of the device, the stored log is limited. If you need to 
save the log for a long time, it is recommended that you enable the network log function to 
ensure that the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment 

In  order  to  better  ensure  the  safety  of  device  and  reduce  potential  cyber  risks,  we 
recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 
devices from external network. 

 

The network should be partitioned and isolated according to the actual network needs. 
If  there  are  no  communication  requirements  between  two  sub  networks,  it  is 
suggested to use VLAN, network GAP and other technologies to partition the network, 
so as to achieve the network isolation effect. 

 

Establish the 802.1x access authentication system to reduce the risk of unauthorized 
access to private networks. 

Summary of Contents for KTA02

Page 1: ...Analog 4 Wire Video Intercom Quick Start Guide V1 0 0...

Page 2: ...me V1 0 0 First release August 2020 About the Manual The manual is for reference only If there is inconsistency between the manual and the actual product the actual product shall prevail We are not li...

Page 3: ...rademarks registered trademarks and the company names in the manual are the properties of their respective owners Please visit our website contact the supplier or customer service if there is any prob...

Page 4: ...evice at well ventilated places and do not block its ventilation opening Use the device only within rated input and output range Do not dismantle the device by yourself The device should be used with...

Page 5: ...Installation 4 Indoor Monitor 4 Door Station 4 3 Wiring 6 Preparations 6 3 1 1 Port Connection Rules 6 3 1 2 Cord Specification 7 Wiring One Door Station and One Indoor Monitor 7 Wiring Three Door St...

Page 6: ...to do voice and video calls The door station is installed outdoors and indoor monitor is installed indoors Features Indoor Monitor Real time video voice communication Can be connected to three door s...

Page 7: ...espectively 6 When someone is calling press to open the door where the door station is installed 7 Power indicator 8 LCD screen 9 Microphone 10 Built in camera 11 Power indicator 12 Call button Press...

Page 8: ...panel Table 1 2 Rear panel No Description No Description 1 Analog camera port 1 6 VTH cascading port 1 2 VTO port 1 7 VTH cascading port 2 3 VTO port 2 8 VTO hanging slot 4 Power input 9 Wires 5 Anal...

Page 9: ...etween the device and the wall Indoor monitor installation Door Station Install the door station bracket on the wall and then hang the door station on the bracket or install the door station cover on...

Page 10: ...5 Apply silicone sealant to the gap between the device and the wall...

Page 11: ...connection rules Port A of an indoor monitor can be connected to Port C of another indoor monitor to do data communication Port B of an indoor monitor can be connected to Port D of another indoor mon...

Page 12: ...erent specifications Table 3 1 Cord specification Transmission Distance TD RVV4 Cord Specification TD 10 m RVV4 0 3 mm 10 m TD 30 m RVV4 0 5 mm 30 m TD 50 m RVV4 0 75 mm If the distance between the do...

Page 13: ...8 Wiring Three Door Stations and One Indoor Monitor Wiring 2...

Page 14: ...9 Wiring Two Door Stations and Three Indoor Monitors Wiring 3 The recommended analog cameras CVBS are HAC 1230 series...

Page 15: ...wn Vol volume Bright brightness Contrast and BellVol bell volume change Bell and turn off DND do not disturb Turn up Vol volume Bright brightness Contrast and BellVol bell volume change Bell and turn...

Page 16: ...unction to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve...

Page 17: ...ve we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmi...

Page 18: ...13 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device...

Reviews: