
reduce risks. If necessary, it is highly recommended to use safe modes, including but not limited
to the following services:
● SNMP: Select SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Select TLS to access the mailbox server.
● FTP: Select SFTP, and set up strong passwords.
● AP hotspot: Select WPA2-PSK encryption mode, and set up strong passwords.
11.
Audio and Video Encrypted Transmission
If your audio and video data contents are important or sensitive, we recommend that you use the
encrypted transmission function to reduce the risk of audio and video data being stolen during
transmission.
Reminder: Encrypted transmissions will cause some loss in transmission efficiency.
12.
Secure Auditing
●
Check online users: It is suggested to check online users regularly to find any
unauthorized logins.
●
Check equipment log: By viewing the logs, you can view the IP addresses that were
used to log in to your devices and their key operations.
13.
Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If it is necessary to
saves the logs, enable the network log function to ensure that the critical logs are synchronized to
the network log server for tracing.
14.
Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
●
Disable the port mapping function of the router to avoid direct access to the intranet
devices from the external network.
●
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use VLAN,
network GAP, and other technologies to partition the network, so as to achieve the network isolation
effect.
●
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
●
It is recommended that you enable your device's firewall or blacklist and whitelist feature to
reduce the risk that your device might be attacked.
Appendix 2 HDD Capacity Calculation
Calculate total capacity needed by each device according to video recording needs(video
recording type and video file storage time).
278
Summary of Contents for 1U POE NVR Series
Page 1: ...User s Manual V4 1 1 ...
Page 106: ...Figure 4 92 Figure 4 93 Step 2 Configure parameters See Table 4 26 95 ...
Page 291: ...280 ...