background image

Cybersecurity Recommendations    22 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We  suggest  you  to  enable  HTTPS,  so  that  you  visit  web  service  through  a  secure 

communication channel. 

7.  Enable Whitelist 

We  suggest  you  to  enable  whitelist  function  to  prevent  everyone,  except  those  with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.  MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment, 

thus reducing the risk of ARP spoofing. 

9.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them.   

10.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.  Secure Auditing   

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization. 

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14.  Construct a Safe Network Environment 

In  order  to  better  ensure  the  safety  of  equipment  and  reduce  potential  cyber  risks,  we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

Содержание DHI-ASI7213X-T

Страница 1: ...Face Recognition Access Controller Quick Start Guide V1 0 0...

Страница 2: ...he paper manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electronic version shall prevail All the designs and software are s...

Страница 3: ...the ventilation of the access controller Operate the access controller within the rated range of power input and output Do not dissemble the access controller Transport use and store the access contr...

Страница 4: ...s 1 2 Installation 6 Installation Notes 6 2 1 Cable Connections 7 2 2 Installation 8 2 3 3 System Operation 12 Initialization 12 3 1 Adding New Users 12 3 2 4 Web Operation 15 Notes of Face Recording...

Страница 5: ...1 6 The 7 inch access controller has two models model A and model B See Figure 1 1 to Figure 1 4 7 Inch Access Controller Dimensions and components of model A 1 mm inch Figure 1 1 Table 1 1 Component...

Страница 6: ...inch Figure 1 2 Table 1 2 Component description 2 No Name No Name 1 USB port 6 IR light 2 MIC 7 Dual camera 3 White fill light 8 Phototransistor 4 Display 9 Cable entry 5 Card swiping area 10 Fingerp...

Страница 7: ...a 6 Display 3 White fill light 7 Card swiping area 4 IR light Dimensions and components of model B 2 mm inch Figure 1 4 Table 1 4 Component description 4 No Name No Name 1 MIC 5 Phototransistor 2 Dual...

Страница 8: ...ponents 4 Dimensions and components 1 mm inch Figure 1 5 Table 1 5 Component description 1 No Name No Name 1 IR light 6 Phototransistor 2 MIC 7 Dual camera 3 White fill light 8 Cable entry 4 Display 5...

Страница 9: ...imensions and components 2 mm inch Figure 1 6 Table 1 6 Component description 2 No Name No Name 1 IR light 6 Phototransistor 2 MIC 7 Dual camera 3 White fill light 8 Cable entry 4 Display 9 Fingerprin...

Страница 10: ...ation should be no less than 100Lux It is recommended that the device is installed indoors at least 3 meters away from windows and doors and 2 meters away from lights Avoid back light and direct sunli...

Страница 11: ...security module is enabled in Function Security Module If the security module is enabled you need to purchase access control security module separately The security module needs separate power supply...

Страница 12: ...3 Ethernet port 4 Ethernet port only supported by 7 inch model B access controllers 5 USB port only supported by 7 inch model B access controllers Installation 2 3 Installation method of model A and...

Страница 13: ...Installation 9 Installation height Figure 2 5 Installation diagram 1 Figure 2 6...

Страница 14: ...in the bracket Fix the bracket on the wall by installing the expansion screws into the six bracket Step 2 installation holes Connect cables for access controller Step 3 See 2 2 Cable Connections Hang...

Страница 15: ...Installation 11 Applying silicon sealant Figure 2 8...

Страница 16: ...onsist of 8 to 32 non blank characters and contain at least two types of characters among upper case lower case number and special character excluding For access controller without touch screen initia...

Страница 17: ...ecorded and one fingerprint needs to be verified three times You can enable the Duress FP function under each fingerprint and only one of the three fingerprints can be the duress fingerprint Alarms wi...

Страница 18: ...set a period in which the user can unlock the door For detailed period settings see the user manual Holiday Plan You can set a holiday plan in which the user can unlock the door For detailed holiday p...

Страница 19: ...p 1 controller in the address bar and then press Enter Make sure that the computer used to log in to the web is in the same LAN with the device 7 inch model B access controllers of have dual NICs The...

Страница 20: ...ep your face clean Keep the device at least two meters away from light source and at least three meters away from windows or doors otherwise backlight direct sunlight might influence face recognition...

Страница 21: ...might be influenced Appendix figure 1 2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair Do not wear glasses hats heavy beards or ot...

Страница 22: ...n importing face images through the management platform make sure that image resolution is within the range 150 300 600 1200 image pixels are more than 500 500 image size is less than 75KB and image n...

Страница 23: ...print is centered on the recording area Do not put the fingerprint sensor at places with intense light high temperature and high humidity If your fingerprints are worn or are unclear try other unlock...

Страница 24: ...Fingerprint Record Instruction 20 Appendix figure 2 2 Correct finger pressing Incorrect method Appendix figure 2 3 Wrong finger pressing...

Страница 25: ...ed to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client softwar...

Страница 26: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Страница 27: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Отзывы: