background image

● Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of 

numbers to the device. Do not DMZ the device's IP address. 
● You do not need to forward any ports for individual cameras if they are all connected to a 

recorder on site; just the NVR is needed. 

 

7. Disable Auto-Login on SmartPSS:

 

Those using SmartPSS to view their system and on a computer that is used by multiple people 

should disable auto-login. This adds a layer of security to prevent users without the appropriate 

credentials from accessing the system. 

 

8. Use a Different Username and Password for SmartPSS:

 

In the event that your social media, bank, email, etc. account is compromised, you would not 

want  someone  collecting  those  passwords  and  trying  them  out  on  your  video  surveillance 

system. Using a different username and password for your security system will make it more 

difficult for someone to guess their way into your system. 

 

9. Limit Features of Guest Accounts:

 

If your system is set up for multiple users, ensure that each user only has rights to features and 

functions they need to use to perform their job. 

 

10. UPnP:

 

● UPnP will automatically try to forward ports in your router or modem. Normally this would be a 

good  thing.  However,  if  your  system  automatically  forwards  the  ports  and  you  leave  the 

credentials defaulted, you may end up with unwanted visitors. 
● If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should 

be turned off regardless. Disabling UPnP is recommended when the function is not used in real 

applications. 

 

11. SNMP:

 

Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, 

for tracing and testing purposes only. 

 

12. Multicast:

 

Multicast is used to share video streams between two recorders. Currently there are no known 

issues involving Multicast, but if you are not using this feature, deactivation can enhance your 

network security. 

 

13. Check the Log:

 

If you suspect that someone has gained unauthorized access to your system, you can check 

the system log. The system log will show you which IP addresses were used to login to your 

system and what was accessed. 

 

14. Physically Lock Down the Device:

 

Содержание ASC1208C-S

Страница 1: ...Access Controller User s Manual V1 0 1...

Страница 2: ...he credentials to your devices to help ensure that only authorized users are able to access the system 2 Change Default HTTP and TCP Ports Change default HTTP and TCP ports for systems These are the t...

Страница 3: ...multiple users ensure that each user only has rights to features and functions they need to use to perform their job 10 UPnP UPnP will automatically try to forward ports in your router or modem Norma...

Страница 4: ...rts on the Back of an NVR Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and cannot be accessed directly 16 Isolate NVR and IP Camera Network The network...

Страница 5: ...ce fingerprints car plate number Email address phone number GPS and so on You need to be in compliance with the local privacy protection laws and regulations to protect the legitimate rights and inter...

Страница 6: ...ny doubt or dispute please refer to our final explanation Upgrade the reader software or try other mainstream reader software if the Guide in PDF format cannot be opened All trademarks registered trad...

Страница 7: ...with category I structure shall be connected to grid power output socket which is equipped with protective grounding Power plug or appliance coupler is a disconnecting device During normal use please...

Страница 8: ...e updated in a real time way according to the product which won t be further notified The user shall undertake any losses resulting from violation of guidance in the document The document may include...

Страница 9: ...nts Foreword I Important Safeguards and Warnings III 1 Overview 1 2 Appearance and Dimension 2 3 Device Installation 3 4 Wiring and System Network 4 4 1 Wiring Diagram 4 4 2 System Network 5 5 Technic...

Страница 10: ...ocal vandal proof alarm Support 4 groups of external alarm input with anti cut function Support 8 groups of door lock control output Support 4 groups of external alarm triggering output Support audio...

Страница 11: ...2 2 Appearance and Dimension Its appearance and dimension are shown in Figure 2 1 Dimension unit is mm Figure 2 1...

Страница 12: ...many as the total weight of the device bracket and accessories Installation steps Step 1 Measure every hole distance and position according to holes at rear shell of the device drill holes in the wal...

Страница 13: ...4 4 Wiring and System Network 4 1 Wiring Diagram Device wiring diagram is shown in Figure 4 1 Figure 4 1...

Страница 14: ...5 4 2 System Network 8 door one way access controller lock reader and others connect a system as shown in Figure 4 2 Figure 4 2...

Страница 15: ...ule 128 Period 128 Holiday 128 Unlock Mode Card card password password card or password card fingerprint fingerprint password fingerprint or card or password by period Cross Segment Network Support 8...

Отзывы: