background image

Cybersecurity  Recommendations

   

VIII 

4.

 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

5.

 

Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.

 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7.

 

Enable Whitelist   

We suggest you to enable whitelist function to prevent everyone, except those with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 

computer

’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.

 

MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment,  thus 

reducing the risk of ARP spoofing. 

9.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it  is  recommended  to  turn off  some  services  such as SNMP, SMTP, UPnP,  etc.,  to 

reduce risks. 

If  necessary,  it  is  highly  recommended  that  you  use  safe  modes,  including  but  not  limited  to  the 

following services: 

-

 

SNMP

Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

-

 

SMTP

Choose TLS to access mailbox server. 

-

 

FTP

Choose SFTP, and set up strong passwords.   

-

 

AP hotspot

Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.

 

Secure Auditing   

-

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization.   

-

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.

 

Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save 

the log for a long time, it is recommended that you enable the network log function to ensure that 

the critical logs are synchronized to the network log server for tracing. 

Содержание DH-TPC-BF5601N-B

Страница 1: ...Thermal Network Bullet Camera Quick Start Guide V1 0 0...

Страница 2: ...uide may cause harmful interference to radio communication For class A device these limits are designed to provide reasonable protection against harmful interference in a commercial environment Operat...

Страница 3: ...Revision Content Release Date 1 V1 0 0 First release January 21 2019 Privacy Protection Notice As the device user or data controller you might collect personal data of others such as face fingerprint...

Страница 4: ...am and supplementary documentation There still might be deviation in technical data functions and operations description or errors in print If there is any doubt or dispute please refer to our final e...

Страница 5: ...power supply is correct before operating the device Use power supply conforming to SELV requirements and power the camera in the rated voltage conforming to Limited Power Source in IEC60950 1 And ref...

Страница 6: ...dismantle the device there is no part which can be repaired by users themselves It may cause water leakage or bad image for the device if it is dismantled unprofessionally It is recommended to use the...

Страница 7: ...trol cabinet Please cut off power before device maintenance and overhaul It is prohibited to open the cover with power on in the explosion environment Please make sure all the explosionproof component...

Страница 8: ...e system is equipped with the latest security patches and fixes When the equipment is connected to the public network it is recommended to enable the auto check for updates function to obtain timely i...

Страница 9: ...ons to them 10 Disable Unnecessary Services and Choose Secure Modes If not needed it is recommended to turn off some services such as SNMP SMTP UPnP etc to reduce risks If necessary it is highly recom...

Страница 10: ...the intranet devices from external network The network should be partitioned and isolated according to the actual network needs If there are no communication requirements between two sub networks it...

Страница 11: ...al Configuration 4 Initializing Camera 4 3 1 Modifying IP Address 5 3 2 Live Video 5 3 3 4 Installation 7 Cable Preparation 7 4 1 Installing Camera 8 4 2 4 2 1 Optional Installing SD Card 8 4 2 2 Fixi...

Страница 12: ...Unpacking the Box 1 1 Unpacking the Box Refer to the following checklist and check the package If you find device damage or any loss contact the after sales service Checklist Figure 1 1...

Страница 13: ...r more details about the cable function Table 2 1 Cable ports description SN Port Port Name Connector Function Description 1 AUDIO OUT Audio output port 3 5mm Jack port output audio signal to earphone...

Страница 14: ...mage Please refer to Table 2 2 for introduction of I O port function Table 2 2 I O port description Port Color Cable port name Function description I O port Green ALARM_COM1 Alarm output common port U...

Страница 15: ...by default and your PC s IP address are in the same network segment Open IE browser input camera default IP address in the address bar and then press Step 1 Enter The factory default IP address is 192...

Страница 16: ...ect Setup Network TCP IP and the system will display the interface of TCP IP Step 2 which is shown in Figure 3 2 TCP IP Figure 3 2 Configure relevant info of IP address and click Save Step 3 Live Vide...

Страница 17: ...to install plug in for the first system login please save and install plug in according to prompt The web interface will refresh automatically after plug in installation is completed then live video...

Страница 18: ...0Ft 457M Selecting Needed Power Cable It is recommended to implement according to the following requirements when the users need to lengthen the power cable Max Transmission distance is recommended wh...

Страница 19: ...card slot for reset hole Long press the reset button for 4 seconds 5 seconds and you will reset your Camera Please check if the waterproof ring is installed properly before closing the cover otherwise...

Страница 20: ...4 2 2 Fixing Camera Fixing camera Figure 4 2 4 2 3 Connecting Cable Ports Refer to 2 2 Cable and connect each cable port to corresponding cables Then use the insulting tape to seal each port to preven...

Страница 21: ...Installation 10 4 2 4 Installing Waterproof Connector Installing waterproof connector for network port Figure 4 3 4 2 5 Adjusting Sun Shield Cover Adjusting sun shield cover Figure 4 4...

Страница 22: ...adjusting device direction and monitoring angle Tighten the adjusting screw firmly after adjustment is completed Please do not rotate the device body over 360 when the device body and mounting pedesta...

Страница 23: ...tput in the alarm setup interface Step 4 and then click Save See Figure 5 1 for the Alarm interface Alarm input is corresponding to the alarm input port of device I O cable It is to set corresponding...

Страница 24: ...Alarm 13 Alarm output port ALARM_OUT and ALARM_COM form a switch which can be used to provide alarm output Normally the switch is on and the switch will be off when there is alarm output Alarm output...

Страница 25: ...the earth Open floor cable layout is forbidden In area of strong thunderstorm hit or near high sensitive voltage such as near high voltage transformer substation you need to install additional high po...

Отзывы: