background image

 

Appendix 1 Cybersecurity Recommendations 

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps 
toward protecting and strengthening networks and networked appliances will make them less 
susceptible to attacks. Below are some tips and recommendations on how to create a more secured 
security system. 

Mandatory actions to be taken for basic device network security:

 

1.  Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

  The length should not be less than 8 characters; 

  Include at least two types of characters; character types include upper and lower case letters, 

numbers and symbols; 

  Do not contain the account name or the account name in reverse order; 

  Do not use continuous characters, such as 123, abc, etc.; 

  Do not use overlapped characters, such as 111, aaa, etc.; 

2.  Update Firmware and Client Software in Time 

  According to the standard procedure in Tech-industry, we recommend to keep your device 

(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with 
the latest security patches and fixes. When the device is connected to the public network, it is 
recommended to enable the "auto-check for updates" function to obtain timely information 
of firmware updates released by the manufacturer. 

  We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your device network security:

 

1.  Physical Protection 

We suggest that you perform physical protection to device, especially storage devices. For 
example, place the device in a special computer room and cabinet, and implement well-done 
access control permission and key management to prevent unauthorized personnel from 
carrying out physical contacts such as damaging hardware, unauthorized connection of 
removable device (such as USB flash disk, serial port), etc. 

2.  Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3.  Set and Update Passwords Reset Information Timely 

The device supports password reset function. Please set up related information for password 
reset in time, including the end user’s mailbox and password protection questions. If the 
information changes, please modify it in time. When setting password protection questions, it is 
suggested not to use those that can be easily guessed. 

4.  Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password several 
times, the corresponding account and the source IP address will be locked. 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers between 
1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 

Содержание DH-PFS3006-4GT-60

Страница 1: ...Ethernet Switch 4 8 port Unmanaged Desktop Switch Quick Start Guide V1 0 0...

Страница 2: ...e actual product shall prevail We are not liable for any loss caused by the operations that do not comply with the manual The manual would be updated according to the latest laws and regulations of re...

Страница 3: ...II when using the device If there is any uncertainty or controversy please refer to our final explanation...

Страница 4: ...ge Do not disassemble the device without professional instruction Transport use and store the device in allowed ranges of humidity and temperature When removing the cable power off the device first to...

Страница 5: ...atures 1 2 Port and Indicator 2 2 1 Front Panel 2 2 2 Rear Panel 3 3 Installation 4 3 1 Preparation 4 3 2 Desktop Mount 4 3 3 Wall Mount 4 4 Wiring 5 4 1 Connecting GND 5 4 2 Connecting Power Cord 5 4...

Страница 6: ...for different scenarios The device also supports power consumption management which can adapt to the fluctuation of power consumption of terminal device to ensure stable operation The device is applic...

Страница 7: ...n 1 10 100 Mbps or 10 100 1000 Mbps self adaptive Ethernet ports 2 10 100 Mbps or 10 100 1000 Mbps self adaptive uplink port 3 Power indicator On Power on Off Power off 4 Single port connection status...

Страница 8: ...Extend Mode Extends the maximum transmission distance to 250 m but reduces average transmission speed to 10 Mbps Speed Not included in the figure Uplink port speed indicator On 100 Mbps 1000 Mbps Off...

Страница 9: ...solid and flat desktop 3 3 Wall Mount Step 1 Drill two M4 screws into the wall leaving a space of 4 mm between the wall and the head of the screw Screws do not come with the package Purchase them as n...

Страница 10: ...ground cable to the ground bar turn the hex nut clockwise with a wrench to fasten the other end of the ground cable to the ground terminal Figure 4 1 Connect GND 4 2 Connecting Power Cord Before conne...

Страница 11: ...n white 8 brown 4 4 Connecting PoE Ethernet Port You can directly connect the device PoE Ethernet port to the switch PoE Ethernet port through network cable to achieve synchronized network connection...

Страница 12: ...We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physic...

Страница 13: ...inder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in wi...

Отзывы: