Dahua SD4E425GB-HNR-A-PV1 Installation Manual Download Page 26

Appendix 1  Cybersecurity Recommendations

Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords

Please refer to the following suggestions to set passwords:

The length should not be less than 8 characters.

Include at least two types of characters; character types include upper and lower case letters,

numbers and symbols.

Do not contain the account name or the account name in reverse order.

Do not use continuous characters, such as 123, abc, etc.

Do not use overlapped characters, such as 111, aaa, etc.

2. Update Firmware and Client Software in Time

According to the standard procedure in Tech-industry, we recommend to keep your

equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is

equipped with the latest security patches and fixes. When the equipment is connected to the

public network, it is recommended to enable the “auto-check for updates” function to obtain

timely information of firmware updates released by the manufacturer.

We suggest that you download and use the latest version of client software.

"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection

We suggest that you perform physical protection to equipment, especially storage devices. For

example, place the equipment in a special computer room and cabinet, and implement well-

done access control permission and key management to prevent unauthorized personnel from

carrying out physical contacts such as damaging hardware, unauthorized connection of

removable equipment (such as USB flash disk, serial port), etc.

2. Change Passwords Regularly

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.

3. Set and Update Passwords Reset Information Timely

The device supports password reset function. Please set up related information for password

reset in time, including the end user’s mailbox and password protection questions. If the

information changes, please modify it in time. When setting password protection questions, it is

suggested not to use those that can be easily guessed.

4. Enable Account Lock

The account lock feature is enabled by default, and we recommend you to keep it on to

guarantee the account security. If an attacker attempts to log in with the wrong password

several times, the corresponding account and the source IP address will be locked.

5. Change Default HTTP and Other Service Ports

We suggest you to change default HTTP and other service ports into any set of numbers

between 1024–65535, reducing the risk of outsiders being able to guess which ports you are

using.

6. Enable HTTPS

We suggest you to enable HTTPS, so that you visit Web service through a secure communication

channel.

7. MAC Address Binding

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus

reducing the risk of ARP spoofing.

8. Assign Accounts and Privileges Reasonably

20

Summary of Contents for SD4E425GB-HNR-A-PV1

Page 1: ...V1 0 2 Network Speed Dome PTZ Camera Installation Manual...

Page 2: ...ded could result in slight or moderate injury Indicates a potential risk which if not avoided could result in property damage data loss reductions in performance or unpredictable results Electrostatic...

Page 3: ...und between the manual and the product We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual The manual will be updated according to the...

Page 4: ...n eroding the Device Avoid the lens aiming at intense light source including sunlight and incandescent light otherwise the lens might be damaged It is recommended to use the Device with a lightning pr...

Page 5: ...ning Requirements Clean the enclosure with soft cloth To remove the dirt you can dip the soft cloth in proper detergent wring the soft cloth out and then dry the enclosure with soft cloth Do not use g...

Page 6: ...2 1 Alarm Cable Connection 4 2 2 2 Thunder Proof Cable Connection 5 3 RS 485 Cable 9 3 1 Basic Features 9 3 2 Common Issues in Use 9 3 3 FAQ on RS 485 Cable 10 4 Wi Fi Performance 11 5 Cable Diameter...

Page 7: ...4 times the weight of the Device and its mounting accessories for speed domes make sure that the ceiling and wall can sustain 8 times the weight of the Device and its mounting accessories Do not inst...

Page 8: ...ith intense electromagnetic interference too many devices are connected to the RS 485 cable Otherwise maximum transmission distance will be increased 1 3 3 Selecting Power Cable 1 3 3 1 Power Cable De...

Page 9: ...l combination cable by default including power cord video cable audio cable RS 485 control cable alarm cable network cable and optical fiber cable Cables might be different depending on the model The...

Page 10: ...reen Alarm input 4 Purple Alarm input 5 White Alarm input 6 Yellow black Alarm input 7 2 2 Cable Connection 2 2 1 Alarm Cable Connection Procedure Step 1 Connect the alarm input device to ALARM_IN and...

Page 11: ...ic steel tube and then do equipotential grounding to both ends of steel tubes Laying overhead power cables are prohibited At places with severe thunderstorms and induced voltage like substation you ne...

Page 12: ...ed to the grounding wire should be less than 4 5 The radius is 60 m 6 Lightning conductor 7 Steel tube Figure 2 3 Installing lightning protection devices outdoors 2 R The radius of the circle and R 60...

Page 13: ...less than 25 mm2 to connect the yellow green grounding cable grounding screws to the indoor equipotential grounding terminals Figure 2 4 Installing lightning protection devices indoors Table 2 3 Insta...

Page 14: ...No Name 2 Indoor equipotential grounding terminal 8...

Page 15: ...is the longest among all the devices see Figure 3 1 cable length between 1 and 15 is the longest However this connection manner does not comply with the RS 485 industrial standard As a result common i...

Page 16: ...misconnected Connect cables to the positive electrode and negative electrode correctly Loose connection Connect the cables firmly RS 485 cable is broken Replace RS 485 cable The Device can be controll...

Page 17: ...nnel might be different depending on the model Transmission performance At open places without interference if the Device is installed at least 1 5 m above the ground the effective communication dista...

Page 18: ...ransmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 391 119 611 186 954 291 2443 745 1...

Page 19: ...it for transmission distance is foot m Table 6 1 Cable diameter 12 VDC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmissi...

Page 20: ...1 Cable diameter 24 VDC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance...

Page 21: ...1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 1832 558 2862 872 4473 1363 11450 3490 10 916 279 1431 436 2236 682 5725 1745 15 611 186 954 291 1491 454 3817 1163 20 45...

Page 22: ...istance Diameter 1 25 Transmission Distance Diameter 2 00 130 70 21 110 34 172 52 440 134 140 65 20 102 31 160 49 409 125 150 61 19 95 29 149 45 382 116 160 57 17 89 27 140 43 358 109 170 54 16 84 26...

Page 23: ...nce Diameter 1 25 Transmission Distance Diameter 2 00 5 3257 993 5089 1551 7951 2424 20355 6204 10 1628 496 2544 776 3976 1212 10177 3102 15 1086 331 1696 517 2650 808 6785 2068 20 814 248 1272 388 19...

Page 24: ...Diameter 1 25 Transmission Distance Diameter 2 00 130 125 38 196 60 306 93 783 239 140 116 35 182 55 284 87 727 222 150 109 33 170 52 265 81 678 207 160 102 31 159 48 248 76 636 194 170 96 29 150 46...

Page 25: ...0 130 36 39 0 01327 0 140 35 0 01539 0 160 34 37 0 02011 0 180 33 0 02545 0 200 32 35 0 03142 0 230 31 0 04115 0 250 30 33 0 04909 0 290 29 31 0 06605 0 330 28 30 0 08553 0 350 27 29 0 09621 0 400 26...

Page 26: ...access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized connection of removable equipment such as USB...

Page 27: ...gularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in to your devices and their key operations...

Reviews: