Dahua DH-PFS3125-24ET-190 Скачать руководство пользователя страница 14

User’s Manual 

 

1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6.

 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7.

 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing 
the risk of ARP spoofing. 

8.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11.

 

Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the device is 
logged in without authorization. 

 

Check device log: By viewing the logs, you can know the IP addresses that were used to log 
in to your devices and their key operations. 

12.

 

Network Log 

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the 
log for a long time, it is recommended that you enable the network log function to ensure that 
the critical logs are synchronized to the network log server for tracing. 

13.

 

Construct a Safe Network Environment 

In order to better ensure the safety of device and reduce potential cyber risks, we recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet devices 
from external network. 

 

The network should be partitioned and isolated according to the actual network needs. If 
there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

 

Establish the 802.1x access authentication system to reduce the risk of unauthorized access 
to private networks. 

Содержание DH-PFS3125-24ET-190

Страница 1: ...24 Port 10 100 Mbps 1 Port Gigabit Combo Base T SFP multi mode PoE Switch User s Manual V1 0 2 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Страница 2: ...rty damage data loss reductions in performance or unpredictable results TIPS Provides methods to help you solve a problem or save time NOTE Provides additional information as a supplement to the text...

Страница 3: ...ge without prior written notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and suppleme...

Страница 4: ...power to the Device before completing installation Do not place objects on the Device Qualified engineers needed All the examination and repair work should be done by the qualified service engineers W...

Страница 5: ...sure to use the same battery model if possible We recommend replace battery regularly such as one year to guarantee system time accuracy Before replacement please save the system setup otherwise you...

Страница 6: ...ponent Description 1 1 3 1 Front Panel 1 1 3 2 Rear Panel 3 Package Contents 3 2 Installation and Connection 5 Installation 5 2 1 1 Desktop Installation 5 2 1 2 Rack mountable Installation in 13 inch...

Страница 7: ...dium sized enterprises intelligent community hotels parks and office network network networking and access requirements Product Features Comply with IEEE802 3 IEEE802 3u IEEE802 3ab IEEE802 3x IEEE802...

Страница 8: ...hes the set limit value which is 190 W and the load quota can no longer be increased 10 100 BASE T adaptive Ethernet port indicators 1 24 25 Link Off The port is NOT connected Solid green The port is...

Страница 9: ...re referred to as Combo port which means they cannot be used simultaneously and only SFP port work or only RJ 45 port work at the same time 1 3 2 Rear Panel The rear panel of the Switch contains one G...

Страница 10: ...User s Manual 4 One Installation Component One AC power cord One User s Manual...

Страница 11: ...issipation from and adequate ventilation around the Switch Make sure the cabinet to enough back up the weight of the Switch and its accessories 2 1 1 Desktop Installation Sometimes users are not equip...

Страница 12: ...r is ON or not When it is ON it indicates the power connection is OK Connecting Computer NIC to the Switch Please insert the NIC into the computer after installing network card driver please connect o...

Страница 13: ...n of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Phy...

Страница 14: ...ransmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Chec...

Страница 15: ...ess filtering function to limit the range of hosts allowed to access the device More information Please visit Dahua official website security emergency response center for security announcements and t...

Страница 16: ...User s Manual...

Отзывы: