background image

 

Cybersecurity Recommendations

  

VIII 

 

Change ONVIF Password 

 

Older IP camera firmware does not automatically change the ONVIF password when 
the system credentials are changed. Update the camera’s firmware to the latest 
revision or manually change the ONVIF password. 

 

Forward Only Ports You Need 

 

Forward only the HTTP and TCP ports that are requited. Do not forward a wide range 
of numbers to the device. Do not DMZ the device's IP address. 

 

Do not forward any ports for individual cameras if they are all connected to a recorder 
on site. Simply forward the NVR port.   

 

Disable Auto-Login on SmartPSS 

 

Disable the Auto-Login feature on SmartPSS installed on a computer that is used by 
multiple people. Disabling auto-login prevents users without the appropriate 
credentials from accessing the system. 

 

Use a Different Username and Password for SmartPSS 

 

Do not a username/password combination that you have in use for other accounts, 
including social media, bank account, or email in case the account is compromised. 
Use a different username and password for your security system to make it difficult for 
an unauthorized user to gain access to the IP system. 

 

Limit Features of Guest Accounts 

 

Ensure that each user has rights to features and functions they need to perform their 
job. 

 

Disable Unnecessary Services and Choose Secure Modes 

 

Turn off specific services, such as SNMP, SMTP, and UPnP, to reduce network 
compromise from unused services. 

 

It is recommended to use safe modes, including but not limited to the following 
services: 

 

SNMP: Choose SNMP v3 and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access a mailbox server. 

 

FTP: Choose SFTP and use strong passwords.   

 

AP hotspot: Choose WPA2-PSK encryption mode and use strong passwords. 

 

Multicast 

 

Multicast is used to share video streams between two recorders. Currently there are 
no known issues involving Multicast. Deactivate this feature if not in use to enhance 
network security. 

 

Check the Log 

 

The information stored in the network log file is limited due to the equipment’s limited 
storage capacity. Enable the network log function to ensure that the critical logs are 
synchronized to the network log server if saving log files is required. 

 

Check the system log if you suspect that someone has gained unauthorized access to 
the system. The system log shows the IP addresses used to login to the system and 
the devices accessed. 

 

Physically Lock Down the Device 

 

Perform physical protection to equipment, especially storage devices. For example, 
place the equipment in a special computer room and cabinet, and implement access 
control permission and key management to prevent unauthorized personnel from 
accessing the equipment. 

Содержание 8A840WANF

Страница 1: ...8A840WANF Quick Installation Guide V1 0 1 Dahua Technology Co Ltd...

Страница 2: ...erty damage data loss lower performance or unpredictable result NOTE Provides additional information as the emphasis and supplement to the text Revision History No Version Revision Content Release Tim...

Страница 3: ...st digital information Dahua recommends multiple redundant recording systems and adoption of backup procedure for all data All trademarks registered trademarks and the company names in the Guide are t...

Страница 4: ...onsult the dealer or an experienced radio TV technician for help Legal Notices Copyright This user guide is 2017 Dahua Technology Company LTD This user guide is the intellectual property of Dahua Tech...

Страница 5: ...o not overload outlets and extension cords which may cause fire or electrical shock Do not place the camera near or in a place where the camera may contact overhead power lines power circuits or elect...

Страница 6: ...etic radiation or unstable lighting Do not use the device in the corrosive environment such as high salt fog area sea beach and coastal area acid gas environment and chemical plants Do not use the dev...

Страница 7: ...er to gently remove the dirt Stained with grease or fingerprints Use a soft cloth to wipe gently the water droplet or the oil from the dome cover Then use an oil free cotton cloth or paper soaked with...

Страница 8: ...count name or the account name in reverse order Do not use sequential characters such as 123 abc etc Do not use repeated characters such as 111 aaa etc Change Default HTTP and TCP Ports Change default...

Страница 9: ...o perform their job Disable Unnecessary Services and Choose Secure Modes Turn off specific services such as SNMP SMTP and UPnP to reduce network compromise from unused services It is recommended to us...

Страница 10: ...d IP Camera Network Ensure that the network for the NVR and IP cameras should not be the same network as a public computer network Separate networks prevent unauthorized users accessing the same netwo...

Страница 11: ...3 1 Alarm Input 5 2 3 2 Alarm Output Level Application 5 2 3 3 Alarm Output Switch Application 6 Locally Storing Data 6 3 Camera Installation 7 Preparing the Camera 8 3 1 1 Unpacking the Camera 8 3 1...

Страница 12: ...st container to transport the unit in the event the unit must be returned for service Retain the carton and all shipping material for future use Please refer to the enclosed CD for more details to vie...

Страница 13: ...allation and Configuration 2 2 Installation and Configuration Framework and Dimension Use this process to plan install and configure the security network and the IP devices Figure 2 1 6CE445XANR Dimen...

Страница 14: ...Installation and Configuration 3 Figure 2 2 PFB306W Dimensions...

Страница 15: ...5 Analog Video Output BNC 1 0 Vp p 75 Network RJ45 6 Audio Red Audio Output White Audio Input Black Audio Ground 7 Alarm Output Blue Alarm Output 1 Black Alarm Output 2 Green Alarm Contact Switch 1 Pi...

Страница 16: ...input signal If input signal is grounded then no alarm input signal is detected Figure 2 4 Alarm Input Diagram 2 3 2 Alarm Output Level Application Use this alarm output configuration if the output t...

Страница 17: ...Extreme Micro SD card or an equivalent substitute as these cards have been fully tested without issue and the SanDisk Extreme line is better suited for constant recording Lower grade SD cards meant f...

Страница 18: ...routed separately inside a different permanently earthed metal conduits not supplied Warning Install external interconnecting cables in accordance to NEC ANSI NFPA70 for US application and Canadian El...

Страница 19: ...nt the camera to the wall 3 1 1 Unpacking the Camera Remove the camera the mount accessories and any hardware packages from the boxes Remove the camera from the plastic wrapping and place the camera d...

Страница 20: ...lace the wide side of the rubber ring onto the end of the network cable extending out from the camera b Pull the waterproof cable end without the Ethernet connector through the body of the Waterproof...

Страница 21: ...bundle to ensure the camera is well grounded Pull the connected cables into the wall mount bracket with care Align the straight edge of the flange on the dome with the straight edge of the mount brac...

Страница 22: ...y manage and automate the assignment of IP addresses DHCP should only be enabled if using dynamic IP address notification or if the DHCP can update a DNS server TFTP The Trivial File Transfer Protocol...

Страница 23: ...ahua supplies the ConfigTool to access and to modify the network settings of a device Refer to the Operation Manual available on the CD included with the camera or on Dahuasecurity com for complete in...

Страница 24: ...evices may have different Web interfaces the figures below are for reference only and may not represent the Web Interface for your camera Refer to the Web Operation Manual included on the CD shipped w...

Страница 25: ...y Activation page Set the parameters for the alarm inputs Check the Enable box to activate the chosen alarm input Alarm 1 or Alarm 2 Set the sensor type for the alarm either Normally Open NO or Normal...

Страница 26: ...e Local tab to view the used capacity and the total capacity of the Micro SD card Expand the Event menu located at the left of the Web interface then select the Abnormality page to set alarms related...

Страница 27: ...y the alarm relay output 10 s to 300 s Check the Send Email box to send an email to a specified user after the device triggers an alarm Set the capacity limit for the Micro SD Card available with the...

Страница 28: ...CA 92618 Tel 949 679 7777 Fax 949 679 5760 Support 877 606 1590 Sales sales usa dahuatech com Support support usa dahuatech com 2019 Dahua Technology USA All rights reserved Design and specifications...

Отзывы: