background image

Cybersecurity Recommendations

   

18

 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We  suggest  you  to  enable  HTTPS,  so  that  you  visit  Web  service  through  a  secure 

communication channel. 

7.  Enable Whitelist 

We  suggest  you  to  enable  whitelist  function  to  prevent  everyone,  except  those  with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.  MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment, 

thus reducing the risk of ARP spoofing. 

9.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.  Secure Auditing   

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization. 

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14.  Construct a Safe Network Environment 

In  order  to  better  ensure  the  safety  of  equipment  and  reduce  potential  cyber  risks,  we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

Summary of Contents for Smart 1U

Page 1: ...Network Video Recorder Quick Start Guide V1 0 1...

Page 2: ...sistency between the manual and the actual product the actual product shall prevail We are not liable for any loss caused by the operations that do not comply with the manual The manual would be updat...

Page 3: ...he company names in the manual are the properties of their respective owners Please visit our website contact the supplier or customer service if there is any problem occurred when using the device If...

Page 4: ...ll ventilated places don t block its ventilation opening Use the device only within rated input and output range Do not dismantle the device arbitrarily Transport use and store the device within allow...

Page 5: ...ts 1 1 2 Installing HDD 2 1 2 1 SMART 1U 2 1 2 2 MINI 1U COMPACT 1U 1U 3 2 Connection 6 3 Local Configurations 7 3 1 Booting Up 7 3 2 Initializing the Device 7 3 3 Modifying IP Address 10 3 4 Registra...

Page 6: ...he local retailer or after sales engineer immediately No Items Requirement 1 Package Appearance No obvious damage Packing materials No broken or distorted positions that could be caused by hit Accesso...

Page 7: ...e and remove the four fixing screws on the baseboard of the device Step 1 Installing HDD 1 Figure 1 1 Remove the cover along the direction shown in the following arrow Step 2 Installing HDD 2 Figure 1...

Page 8: ...installation Installing HDD 6 Figure 1 6 1 2 2 MINI 1U COMPACT 1U 1U For the first time installation make sure whether the HDD has been installed or not It is recommended to use HDD of enterprise leve...

Page 9: ...2 Figure 1 8 Match the four holes on the baseboard to place the HDD Step 3 Installing HDD 3 Figure 1 9 Turn the device upside down match the screws with the holes on the HDD and then Step 4 fasten th...

Page 10: ...Quick Start 5 Installing HDD 5 Figure 1 11 Put back the cover and fasten the screws on the rear panel and side panels to Step 6 complete the installation Installing HDD 6 Figure 1 12...

Page 11: ...t be different depending on the model you purchased 1U series connection Figure 2 1 Check the icons on the rear panel carefully and refer to the actual product for detailed information If the icon is...

Page 12: ...and then connect it to the power socket Always use the stable current It is recommended to use UPS Device of some series does not have the power on off button You can boot up the Device once the powe...

Page 13: ...he password for admin The password must consist of 8 to 32 non blank characters and contain at least two types of characters among number letter and special character excluding Confirm Password Prompt...

Page 14: ...d See Figure 3 3 Once you have configured the unlock pattern the system will require the unlock pattern as the default login method If you skip this setting enter the password for login If you do not...

Page 15: ...ter the security code that you will get from this reserved email address to reset the password of admin Security Questions Configure the security questions and answers In case you forgot password ente...

Page 16: ...lick the remote device or select the check box in front of the device and then click Add to register the remote device Click Manual Add and enter the IP address of the remote device to register it Reg...

Page 17: ...during the network outage back to the NVR device to ensure record integrity Set the schedule period It includes drawing and editing Step 3 Drawing Press and hold down the left button of the mouse and...

Page 18: ...Local Configurations 13 Record search Figure 3 7 3 7 Shutdown Click at the top right corner and then select Shutdown...

Page 19: ...name is admin and the login password is the one you set in device initialization To ensure device security it is recommended to modify the admin password regularly and keep it properly If you forgot t...

Page 20: ...ETWORK TCP IP P2P Mobile app QR code Figure 5 1 Register device on the mobile app Step 2 After registering the Device successfully you can view the monitor screen on the cell phone app The following f...

Page 21: ...evice label or the device SN on the local interface NETWORK P2P 3 to register the device See Figure 5 4 P2P 3 Figure 5 4 After scanning you can view the device SN Click Start Live Preview and you can...

Page 22: ...ed to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client softwar...

Page 23: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Page 24: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Reviews: