III
●
Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of
numbers to the device. Do not DMZ the device's IP address.
●
You do not need to forward any ports for individual cameras if they are all connected to a
recorder on site; just the NVR is needed.
7. Disable Auto-Login on STORM VMS:
Those using STORM VMS to view their system and on a computer that is used by multiple
people should disable auto-login. This adds a layer of security to prevent users without the
appropriate credentials from accessing the system.
8. Use a Different Username and Password for STORM VMS:
In the event that your social media, bank, email, etc. account is compromised, you would not
want someone collecting those passwords and trying them out on your video surveillance
system. Using a different username and password for your security system will make it more
difficult for someone to guess their way into your system.
9. Limit Features of Guest Accounts:
If your system is set up for multiple users, ensure that each user only has rights to features and
functions they need to use to perform their job.
10. UPnP:
●
UPnP will automatically try to forward ports in your router or modem. Normally this would be a
good thing. However, if your system automatically forwards the ports and you leave the
credentials defaulted, you may end up with unwanted visitors.
●
If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should
be turned off regardless. Disabling UPnP is recommended when the function is not used in real
applications.
11. SNMP:
Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily,
for tracing and testing purposes only.
12. Multicast:
Multicast is used to share video streams between two recorders. Currently there are no known
issues involving Multicast, but if you are not using this feature, deactivation can enhance your
network security.
13. Check the Log:
If you suspect that someone has gained unauthorized access to your system, you can check
the system log. The system log will show you which IP addresses were used to login to your
system and what was accessed.
14. Physically Lock Down the Device:
Summary of Contents for vupro
Page 1: ...Video Intercom User Manual Villa V1 0 1...
Page 15: ...5 Figure 2 4 2 2 VUO6000CM VUO6100C 2 2 1 Front Panel Figure 2 5...
Page 20: ...10 Figure 2 12 Figure 2 13...
Page 22: ...12 Figure 2 16...
Page 26: ...16 Figure 3 5...
Page 31: ...21 Step 4 Figure 4 4 Fix the bare device onto sheet metal bracket with M3 6 screws Figure 4 5...
Page 33: ...23 Figure 4 7...
Page 51: ...41 Figure 5 25...