Dahua DH-PFS4226-24GT2GF-360 Скачать руководство пользователя страница 19

 

13 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the device, thus 

reducing the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably

 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes

 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 
●  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

●  SMTP: Choose TLS to access mailbox server. 
●  FTP: Choose SFTP, and set up strong passwords.   
●    AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission

 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing

 

●  Check online users: we suggest that you check online users regularly to see if the device 

is logged in without authorization.   

●  Check device log: By viewing the logs, you can know the IP addresses that were used to 

log in to your devices and their key operations. 

12. 

Network Log

 

Due to the limited storage capacity of the device, the stored log is limited. If you need to 

save the log for a long time, it is recommended that you enable the network log function to 

ensure that the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment

 

In order to better ensure the safety of device and reduce potential cyber risks, we 

recommend: 
●  Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

●  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to 

use VLAN, network GAP and other technologies to partition the network, so as to 

achieve the network isolation effect. 

●  Establish the 802.1x access authentication system to reduce the risk of unauthorized 

access to private networks. 

●  Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 

device. 

 

Содержание DH-PFS4226-24GT2GF-360

Страница 1: ...16 24 Port Gigabit Managed PoE Switch Quick Start Guide V1 0 1...

Страница 2: ...and the actual product the actual product shall prevail We are not liable for any loss caused by the operations that do not comply with the manual The manual would be updated according to the latest...

Страница 3: ...II occurring when using the device If there is any uncertainty or controversy we reserve the right of final explanation...

Страница 4: ...n and other dangers Replace the battery with battery of the same type Use locally recommended power cord in the limit of rated specifications Use the standard power adapter We will assume no responsib...

Страница 5: ...IV environment crush puncture cut or incinerate Dispose of the battery as required by local ordinances or regulations...

Страница 6: ...1 2 Device Structure 3 2 1 Front Panel 3 2 2 Rear Panel 4 3 Installation 5 3 1 Installing the Device 5 3 2 Wiring 5 3 2 1 Ethernet Port 5 3 2 2 Console Port 6 3 2 3 SFP Port 7 3 2 4 GND 7 4 Quick Oper...

Страница 7: ...powerful network management function Network management system supports iLinksView CLI web and network management software based on SNMP 1 2 Product Features Layer 2 network management PoE switch Sup...

Страница 8: ...2 Figure 1 1 Networking...

Страница 9: ...lt configuration 4 Console serial port Device debugging port 5 PoE power usage indicator Current power consumption display 6 Downlink indicator Current port link status and PoE status 7 Uplink port in...

Страница 10: ...nsumption display 6 Downlink indicator Current port link status and PoE status 7 Uplink port indicator Link Act indicator 8 System indicator System status When device is booting up the light is flashi...

Страница 11: ...J45 port Equipped with self adaptation function it can be automatically configured to full duplex half duplex operation mode and supports MDI MDI X self recognition function of the cable which means t...

Страница 12: ...ows system for device configuration maintenance and management See Figure 3 5 for cable sequence of RJ 45 DB9 Figure 3 5 Cable sequence of RJ45 DB9 One end of RJ45 DB9 cable is RJ45 connector which ne...

Страница 13: ...nd push it gently into the SFP slot till the SFP module is firmly connected to the slot both the top and bottom spring strip of the SFP module are firmly stuck with the SFP slot 3 2 4 GND Figure 3 8 G...

Страница 14: ...PC Step 4 Run terminal simulation program on the PC and then select the serial port which is to connect the device set the terminal communication parameters The following parameter values have to be i...

Страница 15: ...full license terms must have been made available to you Redboot comes with ABSOLUTELY NO WARRANTY Platform VCore III MIPS32 24KEc LUTON26 RAM 0x80000000 0x88000000 0x80028f20 0x87fdfffc available FLA...

Страница 16: ...must be the same as that you have set in the iLinksView otherwise the iLinksView cannot discover the device 4 3 VLAN Configuration VLAN Virtual Local Area Network is frequently used during actual app...

Страница 17: ...2 Gigabit Ethernet 1 2 Figure 4 2 VLAN networking Configuration Steps The switch configuration is shown as follows 1 Log in to the device Refer to 4 1 First Login by Console Port 2 Run the following...

Страница 18: ...We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physi...

Страница 19: ...inder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in wi...

Отзывы: