background image

III

 

 

● Only forward the HTTP and TCP ports that you need to use. Do not forward a huge range of 

numbers to the device. Do not DMZ the device's IP address. 
● You do not need to forward any ports for individual cameras if they are all connected to a recorder 

on site; just the NVR is needed. 

 

7. Disable Auto-Login on SmartPSS:

 

Those using SmartPSS to view their system and on a computer that is used by multiple people 

should disable auto-login. This adds a layer of security to prevent users without the appropriate 

credentials from accessing the system. 

 

8. Use a Different Username and Password for SmartPSS:

 

In the event that your social media, bank, email, etc. account is compromised, you would not want 

someone collecting those passwords and trying them out on your video surveillance system. Using 

a different username and password for your security system will make it more difficult for someone 

to guess their way into your system. 

 

9. Limit Features of Guest Accounts:

 

If your system is set up for multiple users, ensure that each user only has rights to features and 

functions they need to use to perform their job. 

 

10. UPnP:

 

● UPnP will automatically try to forward ports in your router or modem. Normally this would be a 

good thing. However, if your system automatically forwards the ports and you leave the credentials 

defaulted, you may end up with unwanted visitors. 
● If you manually forwarded the HTTP and TCP ports in your router/modem, this feature should be 

turned off regardless. Disabling UPnP is recommended when the function is not used in real 

applications. 

 

11. SNMP:

 

Disable SNMP if you are not using it. If you are using SNMP, you should do so only temporarily, for 

tracing and testing purposes only. 

 

12. Multicast:

 

Multicast is used to share video streams between two recorders. Currently there are no known 

issues involving Multicast, but if you are not using this feature, deactivation can enhance your 

network security. 

 

13. Check the Log:

 

If you suspect that someone has gained unauthorized access to your system, you can check the 

system log. The system log will show you which IP addresses were used to login to your system and 

what was accessed. 

 

14. Physically Lock Down the Device:

 

Содержание DHI-ASA4214F

Страница 1: ...Face Recognition Access and Time Attendance Terminal Quick Start Guide V1 0 1...

Страница 2: ...the credentials to your devices to help ensure that only authorized users are able to access the system 2 Change Default HTTP and TCP Ports Change default HTTP and TCP ports for systems These are the...

Страница 3: ...or multiple users ensure that each user only has rights to features and functions they need to use to perform their job 10 UPnP UPnP will automatically try to forward ports in your router or modem Nor...

Страница 4: ...Ports on the Back of an NVR Cameras connected to the PoE ports on the back of an NVR are isolated from the outside world and cannot be accessed directly 16 Isolate NVR and IP Camera Network The networ...

Страница 5: ...ler you might collect personal data of others such as face fingerprints car plate number Email address phone number GPS and so on You need to be in compliance with the local privacy protection laws an...

Страница 6: ...s description or errors in print If there is any doubt or dispute please refer to our final explanation Upgrade the reader software or try other mainstream reader software if the Guide in PDF format c...

Страница 7: ...ase don t dismantle the device arbitrarily Please transport use and store the device within allowed humidity and temperature range Power Requirement Please make sure to use batteries according to requ...

Страница 8: ...Description of Wiegand RS485 Input output 7 2 5 2 Wiring Description of Lock Door Sensor and Exit Button 7 2 5 3 Wiring Description of Power and Network Port 9 2 5 4 Wiring Description of External Al...

Страница 9: ...t Support 1 N face recognition advanced face recognition algorithm max 1 000 or 3 000 face library depending on model quick recognition speed and high accuracy rate Face comparison time is 1s face ver...

Страница 10: ...2 1 2 External Dimension External dimension of the device is shown in Figure 1 1 The unit is mm Figure 1 1...

Страница 11: ...apter 1 DC12V 2A 3 Cable 4 4 M4 30 cross recessed pan head flat end screw 2 Fix the bracket to concealed mount 5 Screw bag 1 bag ST3 18 self tapping screw 4 Expansion pipe 4 Without concealed mount fi...

Страница 12: ...4 2 3 Installation Installation of the device is shown in Figure 2 2 and Figure 2 4 Figure 2 2 Figure 2 3...

Страница 13: ...e concealed mount or good fixation fix the bracket onto the wall directly with screw B Before fixing embed expansion pipes at corresponding positions of the wall Step 3 Hang the device onto the hook o...

Страница 14: ...6 Figure 2 5 Figure 2 6 Figure 2 7...

Страница 15: ...or Wiegand In CON1 corresponding terminals are described in Table 2 3 Port No Mark Cable Color Note CON1 Wiega nd RS45 8 input o utput 1 RD Red Positive pole of power Power output 2 RD Black Negative...

Страница 16: ...ON2 lock door contact and exit button 1 COM Lock control output 2 NC 3 NO 4 SR Door sensor 5 PUSH Exit button 6 GND GND shared by door sensor and exit button 7 RX Reserved 8 TX Table 2 5 Figure 2 8 Fi...

Страница 17: ...CON4 corresponding terminals are described in Table 2 7 Port No Mark Note CON4 external alarm input output 1 COM2 External alarm output 2 External alarm output port is able to connect siren etc 2 NO2...

Страница 18: ...10 Figure 2 12 Figure 2 13 External alarm input is shown in Figure 2 14 Figure 2 14...

Страница 19: ...orm will fail to add the device Admin and Password are only used to add the device without admin authority in personnel management If the admin password is forgotten the password can be reset at the p...

Страница 20: ...on t operate in one interface for over 30s it will return to standby interface Figure 3 2 Customize the attendance event in Features Fn Key Please refer to the user s manual for details 3 4 Main Menu...

Страница 21: ...e fingerprint card number password and face so the user can unlock or check attendance with fingerprint card or password The system supports max 30 000 users Select User New User and the screen displa...

Страница 22: ...No Enter card no or put the card in card swiping area the system will recognize the card no automatically Pwd Enter password supporting 1 8 digits of number Access Period select preset access period...

Страница 23: ...This authority is valid globally not just valid to attendance management User only have use authority Admin login the system to configure Table 3 1 After parameter configuration is completed press Ste...

Страница 24: ...3 6 Figure 3 6 Select a corresponding parameter to edit and modify it and press Step 2 The screen prompts Do you want to save settings Press Yes to save and complete configuration Step 3 Search User C...

Страница 25: ...ans that the door can be unlocked by swiping card first and then pressing the fingerprint Press The screen prompts Do you want to save settings Step 3 Press Yes The system returns to Unlock Mode inter...

Страница 26: ...enable disable 3 6 3 Group Combination Set to unlock after authorized by multiple users or user groups Select Access Unlock Mode Group Combination Step 1 The screen displays Figure 3 8 Figure 3 8 Pre...

Страница 27: ...ed after valid users unlock Valid user cannot be greater than total number of user When valid user equals to total number of user the door can be unlocked after all members of the group unlock When va...

Страница 28: ...ection Network Configuration and the screen displays Figure 3 11 Step 1 Figure 3 11 Select adding mode according to actual situation Step 2 IP Address Select IP Address and the screen displays Figure...

Страница 29: ...Dynamic Host Configuration Protocol Enable DHCP function and obtain IP address automatically Then IP Address Subnet Mask and Gateway IP Address cannot be set Enable Disable P2P During use it is unnec...

Отзывы: