Dahua TPC-BF2221-TB7F8 Quick Start Manual Download Page 9

Cybersecurity  Recommendations

   

VIII 

4.

 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

5.

 

Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.

 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7.

 

Enable Whitelist   

We suggest you to enable whitelist function to prevent everyone, except those with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 

computer

’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.

 

MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment,  thus 

reducing the risk of ARP spoofing. 

9.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it  is  recommended  to  turn off  some  services  such as SNMP, SMTP, UPnP,  etc.,  to 

reduce risks. 

If  necessary,  it  is  highly  recommended  that  you  use  safe  modes,  including  but  not  limited  to  the 

following services: 

-

 

SNMP

Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

-

 

SMTP

Choose TLS to access mailbox server. 

-

 

FTP

Choose SFTP, and set up strong passwords.   

-

 

AP hotspot

Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.

 

Secure Auditing   

-

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization.   

-

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.

 

Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save 

the log for a long time, it is recommended that you enable the network log function to ensure that 

the critical logs are synchronized to the network log server for tracing. 

Summary of Contents for TPC-BF2221-TB7F8

Page 1: ...Thermal Hybrid Network Bullet Camera Quick Start Guide V1 0 1...

Page 2: ...uide may cause harmful interference to radio communication For class A device these limits are designed to provide reasonable protection against harmful interference in a commercial environment Operat...

Page 3: ...u solve a problem or save you time NOTE Provides additional information as the emphasis and supplement to the text Revision History No Version Revision Content Release Date 1 V1 0 1 Update screenshot...

Page 4: ...notice The product updates might cause some differences between the actual product and the Guide Please contact the customer service for the latest program and supplementary documentation There still...

Page 5: ...power supply is correct before operating the device Use power supply conforming to SELV requirements and power the camera in the rated voltage conforming to Limited Power Source in IEC60950 1 And ref...

Page 6: ...dismantle the device there is no part which can be repaired by users themselves It may cause water leakage or bad image for the device if it is dismantled unprofessionally It is recommended to use the...

Page 7: ...trol cabinet Please cut off power before device maintenance and overhaul It is prohibited to open the cover with power on in the explosion environment Please make sure all the explosionproof component...

Page 8: ...e system is equipped with the latest security patches and fixes When the equipment is connected to the public network it is recommended to enable the auto check for updates function to obtain timely i...

Page 9: ...ons to them 10 Disable Unnecessary Services and Choose Secure Modes If not needed it is recommended to turn off some services such as SNMP SMTP UPnP etc to reduce risks If necessary it is highly recom...

Page 10: ...the intranet devices from external network The network should be partitioned and isolated according to the actual network needs If there are no communication requirements between two sub networks it...

Page 11: ...able 2 2 2 3 General Configuration 4 Initializing Camera 4 3 1 Modifying IP Address 5 3 2 Live Video 5 3 3 4 Installation 7 Cable Preparation 7 4 1 Installing Camera 8 4 2 4 2 1 Optional Installing SD...

Page 12: ...hecklist and check the package If you find device damage or any loss contact the after sales service Checklist Figure 1 1 Table 1 1 Checklist description No Name No Name No Name 1 Camera 2 Power cable...

Page 13: ...bles 2 2 Cable type might vary with different cameras and the actual product shall prevail Cable ports Figure 2 2 Please refer to Table 2 1 for more details about the cable function Table 2 1 Cable po...

Page 14: ...und pick up and so on AUDIO OUT Audio output port 3 5mm Jack port output audio signal to earphone and other devices AUDIO GND Audio ground terminal Ground terminal 6 I O I O port Alarm signal input ou...

Page 15: ...by default and your PC s IP address are in the same network segment Open IE browser input camera default IP address in the address bar and then press Step 1 Enter The factory default IP address is 192...

Page 16: ...ect Setup Network TCP IP and the system will display the interface of TCP IP Step 2 which is shown in Figure 3 2 TCP IP Figure 3 2 Configure relevant info of IP address and click Save Step 3 Live Vide...

Page 17: ...to install plug in for the first system login please save and install plug in according to prompt The web interface will refresh automatically after plug in installation is completed then live video...

Page 18: ...Ft 229M RG6 U 1 000Ft 305M RG11 U 1 500Ft 457M Selecting Needed Power Cable It is recommended to implement according to the following requirements when the users need to lengthen the power cable Max T...

Page 19: ...hole Long press the reset button for 4 seconds 5 seconds and you will reset your Camera Please check if the waterproof ring is installed properly before closing the cover otherwise it will affect the...

Page 20: ...Installation 9 4 2 2 Fixing Camera Fixing camera Figure 4 3...

Page 21: ...Then use the insulting tape to seal each port to prevent water leakage 4 2 5 Adjusting Camera Please make sure the adjusting screw is loosened when adjusting device direction and monitoring angle Tigh...

Page 22: ...Installation 11 Adjusting camera Figure 4 5 Table 4 4 Components description No Description No Description 1 Screws for adjusting the camera horizontally 2 Screws for adjusting the camera vertically...

Page 23: ...tput in the alarm setup interface Step 4 and then click Save See Figure 5 1 for the Alarm interface Alarm input is corresponding to the alarm input port of device I O cable It is to set corresponding...

Page 24: ...Alarm 13 Alarm output port ALARM_OUT and ALARM_COM form a switch which can be used to provide alarm output Normally the switch is on and the switch will be off when there is alarm output Alarm output...

Page 25: ...onnect the Camera s ground wire to the tower s ground wire And Make sure that the Camera is over 3 m away from the tower lightning rod s top point Use several strands of copper wire whose total diamet...

Page 26: ...ing protection Appendix table 1 1 Components for lightening protection No Name No Name No Name 1 Video lightning rod 2 Communication lightning rod 3 Power lightning rod 4 Ground wire 5 Steel tube shie...

Reviews: