background image

 

22 

reducing the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords.   

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing

 

  Check online users: we suggest that you check online users regularly to see if the device is 

logged in without authorization.   

  Check equipment log: By viewing the logs, you can know the IP addresses that were used to 

log in to your devices and their key operations. 

12. 

Network Log

 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to 
save the log for a long time, it is recommended that you enable the network log function to 
ensure that the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment

 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 
recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

  Establish the 802.1x access authentication system to reduce the risk of unauthorized access to 

private networks. 

  Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 

device. 

Содержание D-SD22204DB-GNY-W

Страница 1: ...Network Speed Dome PTZ Camera Installation Manual V1 0 1...

Страница 2: ...sult in property damage data loss reductions in performance or unpredictable results Electrostatic Sensitive Devices Indicates a device that is sensitive to electrostatic discharge Indicates dangerous...

Страница 3: ...that are not in compliance with the manual The manual will be updated according to the latest laws and regulations of related jurisdictions For detailed information see the paper user s manual use ou...

Страница 4: ...e short circuit or other damage Avoid sea water or rain eroding the Device Avoid the lens aiming at intense light source including sunlight and incandescent light otherwise the lens might be damaged I...

Страница 5: ...ct your local retailer or customer service center Cleaning Requirements Clean the enclosure with soft cloth To remove the dirt you can dip the soft cloth in proper detergent wring the soft cloth out a...

Страница 6: ...on 5 2 2 1 Alarm Cable Connection 5 2 2 2 Thunder Proof Cable Connection 6 2 2 2 1 Outdoor 6 2 2 2 2 Indoor 8 3 RS 485 Cable 10 3 1 Basic Features 10 3 2 Common Issues in Use 10 3 3 FAQ on RS 485 Cabl...

Страница 7: ...e weight of the Device and its mounting accessories for speed domes make sure that the ceiling and wall can sustain 8 times the weight of the Device and its mounting accessories Do not install the Dev...

Страница 8: ...00 bps 800 m The maximum transmission distance will be reduced in the following conditions When thinner communication cables are used the Device is used in places with intense electromagnetic interfer...

Страница 9: ...3 1 3 3 2 PoE Power Cable Table 1 4 PoE power cable POE Specification Network Cable Specification AF CAT5E and network cables with higher standard AT HiPoE or BT...

Страница 10: ...video cable audio cable RS 485 control cable alarm cable network cable and optical fiber cable For details see Figure 2 1 Cables might be different depending on the model The manual will introduce the...

Страница 11: ...input 6 Yellow black Alarm input 7 2 2 Cable Connection 2 2 1 Alarm Cable Connection Step 1 Connect the alarm input device to ALARM_IN and ALARM_GND of the user cable Step 2 Connect alarm output devic...

Страница 12: ...hermetic steel tube and then do equipotential grounding to both ends of steel tubes Laying overhead power cables are prohibited At places with severe thunderstorms and induced voltage like substation...

Страница 13: ...lightning protection devices outdoors No Description 1 Video lightning conductor 2 Communication lightning conductor 3 Power supply lighting conductor 4 Impedance of the cable connected to the groundi...

Страница 14: ...ductor L2 The length of the rail that holds the Device H The length of the lightning conductor To get the value of L1 you need to use the formula 2 2 2 2 Indoor You can use multiple copper cables whos...

Страница 15: ...9 Figure 2 4 Installing lightning protection devices indoors Table 2 3 Installing lightning protection devices indoors No Name 1 Yellow green grounding cable 2 Indoor equipotential grounding terminal...

Страница 16: ...wo devices whose cable length is the longest among all the devices in Figure 3 1 cable length between 1 and 15 is the longest However this connection manner does not comply with the RS 485 industrial...

Страница 17: ...electrode of RS 485 cable are misconnected Connect cables to the positive electrode and negative electrode correctly Loose connection Connect the cables firmly RS 485 cable is broken Replace RS 485 ca...

Страница 18: ...channel might be different depending on the model Transmission performance At open places without interference if the Device is installed at least 1 5 m above the ground the effective communication di...

Страница 19: ...oot m Table 5 1 Cable diameter 24 VAC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmi...

Страница 20: ...smission distance is foot m Table 6 1 Cable diameter 12 VDC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance...

Страница 21: ...ameter 24 VDC and transmission distance Transmission Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter...

Страница 22: ...ssion Power W Transmission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 1357 414 2120 646 3313 1010 8481 2585 10...

Страница 23: ...Diameter 1 25 Transmission Distance Diameter 2 00 120 57 17 88 27 138 42 353 108 130 52 16 82 25 127 39 326 99 140 48 15 76 23 118 36 303 92 150 45 14 71 22 110 34 283 86 160 42 13 66 20 104 32 265 8...

Страница 24: ...mission Distance Diameter 0 80 Transmission Distance Diameter 1 00 Transmission Distance Diameter 1 25 Transmission Distance Diameter 2 00 5 2290 698 3578 1091 5591 1704 14312 4362 10 1145 349 1789 54...

Страница 25: ...istance Diameter 1 25 Transmission Distance Diameter 2 00 130 88 27 138 42 215 66 550 168 140 82 25 128 39 200 61 511 156 150 76 23 119 36 186 57 477 145 160 72 22 112 34 175 53 447 136 170 67 20 105...

Страница 26: ...950 0 130 36 39 0 01327 0 140 35 0 01539 0 160 34 37 0 02011 0 180 33 0 02545 0 200 32 35 0 03142 0 230 31 0 04115 0 250 30 33 0 04909 0 290 29 31 0 06605 0 330 28 30 0 08553 0 350 27 29 0 09621 0 400...

Страница 27: ...room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized conn...

Страница 28: ...we suggest that you check online users regularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in...

Отзывы: