background image

User’s Manual 

20

 

We suggest you to change default HTTP and other service ports into any set of numbers 
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are 
using. 

6.

 

Enable HTTPS 
We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7.

 

MAC Address Binding 
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing 
the risk of ARP spoofing. 

8.

 

Assign Accounts and Privileges Reasonably 
According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9.

 

Disable Unnecessary Services and Choose Secure Modes 
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10.

 

Audio and Video Encrypted Transmission 
If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11.

 

Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the device is 
logged in without authorization. 

 

Check device log: By viewing the logs, you can know the IP addresses that were used to log 
in to your devices and their key operations. 

12.

 

Network Log 
Due to the limited storage capacity of the device, the stored log is limited. If you need to save 
the log for a long time, it is recommended that you enable the network log function to ensure 
that the critical logs are synchronized to the network log server for tracing. 

13.

 

Construct a Safe Network Environment 
In order to better ensure the safety of device and reduce potential cyber risks, we recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 
devices from external network. 

 

The network should be partitioned and isolated according to the actual network needs. If 
there are no communication requirements between two sub networks, it is suggested to 
use VLAN, network GAP and other technologies to partition the network, so as to achieve 
the network isolation effect. 

 

Establish the 802.1x access authentication system to reduce the risk of unauthorized access 
to private networks. 

Содержание DHI-ISC-EAA8000-P

Страница 1: ...User s Manual I V1 0 0 EAS Acousto Magnetic Antenna User s Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD ...

Страница 2: ...lt in slight or moderate injury CAUTION Indicates a potential risk which if not avoided could result in property damage data loss reductions in performance or unpredictable results TIPS Provides methods to help you solve a problem or save time NOTE Provides additional information as a supplement to the text Revision History Version Revision Content Release Time V1 0 0 First release July 2021 Priva...

Страница 3: ...ween the electronic version and the paper version All designs and software are subject to change without prior written notice Product updates might result in some differences appearing between the actual product and the manual Please contact customer service for the latest program and supplementary documentation There might be errors in the print or deviations in the description of the functions o...

Страница 4: ...g the device It is recommended to use this device with a surge protection device SPD to improve the lightning protection effect It is recommended to ground the earthing hole of the device to improve device reliability It is recommended to install the device 2 meters away from the escalator to improve device reliability Power Requirements Only use the wire assembly power cable recommended in this a...

Страница 5: ...4 Packing List 4 Installation and Configuration 5 3 3 1 Installation and Configuration Settings 5 3 3 2 Description of Primary Antenna TX Board Ports and Manual Configuration of Hardware 7 3 3 3 Description of RX Board Ports and Manual Configuration of Hardware 10 Software Debugging 11 3 4 1 Software Installation 11 3 4 2 Interface Parameter Description 12 Cybersecurity Recommendations 19 ...

Страница 6: ...r power on effective identification system and avoiding more than 95 of external interference sources Reading distance The maximum detection distance of labels is 800 mm 900 mm and the maximum detection distance of tags is 900 mm 1400 mm Invention patent Digital receiving technology High stability without temperature drift which is the core concept of DSP technology High integration Small size sho...

Страница 7: ...vironment and detect 58 KHz labels and tags It has strong stability and high detection distance The Acousto Magnetic system includes a primary antenna with two replica antennas no other controllers are needed which makes installation in large supermarkets or multi export venues very convenient Consequently Acousto Magnetic system is regarded as the best choice by various stores and supermarkets Ap...

Страница 8: ...User s Manual 3 Dimensions Unit mm inch ...

Страница 9: ... ventilated Pay attention to sun protection waterproof and moisture proof Only be installed by professionals and strictly enforce safety regulations Strictly grounded and powered independently Operating temperature 5 C to 50 C Packing List Table 3 1 Packing list Packing list Image Packing box Primary antenna Replica antenna Connection cable AC110 Power supply OR AC220 Power supply ...

Страница 10: ...100 expansion screw 4 Marker 1 Open end wrenches Cutting Machine 1 Hammer 1 Fine sand Scuff plate Power drill 1 Configuration cable 1 Site survey Equipment installation must be at least 2 meters away from large electrical appliances escalators metal panels etc After determining the installation location use a marker to draw lines punch holes and cut grooves Then clean up the site ...

Страница 11: ...l 6 Install and fix the equipment Put fine sand in the cutting groove to protect the cables and fill the gaps Next install the scuff plate on the floor Then fix the equipment The equipment installation is complete ...

Страница 12: ... electrical hot plug will cause damage to TX board USB Port 1 USB port for software configuration Use the dedicated blue configuration line to connect CCTV Port 1 Port per antenna Optional not required J201 J301 J401 Corresponding to the channel signals of CH1 CH2 and CH3 which is for strengthening the function of noise reduction It is recommended to be used under the guidance of technicians RESET...

Страница 13: ...the remote guidance of maintenance personnel which greatly reduces the amount of maintenance on site When making settings through the software on site all connections of threshold must be disabled J108 1 2 Transmission off 3 4 System reset 5 6 Channel locking display J108 1 2 Turn off the transmission of the entire system You can choose to turn off the transmission of the system when the system is...

Страница 14: ...ht is on for channel 1 The second light from the right is on for channel 2 Both lights are on for channel 3 The three rightmost lights in the second row are the indicator lights for channel noise and environmental interference signals light 6 to light 8 If 1 to 2 lights are on it means normal If 3 or more lights are on it means too large interference In this case shortening the installation distan...

Страница 15: ...um High It can be adjusted according to the environmental conditions on site and the factory default setting is M When there is a lot of interference on site try to place the jumper in a low gear L to reduce the antenna s ability to sense interference improve the antenna s ability to detect and reduce the false alarm rate RX 1 receiving coil for connecting the antenna LIGHT 1 alarm indicator for c...

Страница 16: ...ck on the computer desktop and select My Computer Device Manager Port Use blue configuration cable to connect TX board and computer Port B is for connecting TX board Port A is for connecting computer Configuration cable After finishing the connection of TX board and computer COM interface will appear at software of computer Select Serial port and then click Open all the default parameters of the s...

Страница 17: ...e now Tx Power High High Medium Low No need to set up Rx Delay 0 100 No need to set up Slope Rising Rising Falling If there is always jitter between the external phase and system phase when the system is synchronized try to change the slope By default the left is Null line the right is Fire line Jammer Detc OFF ON OFF Detect whether there is Jammer Detc around the antenna that maliciously interfer...

Страница 18: ... board are disconnected otherwise the setting of J107 will affect the software settings TX ON ON OFF Transmission function on or off RX ON ON OFF Receiving function on or off Set Click this button after changing the parameters Clear Clear the setting Query Query the current parameters need to click this button after opening the serial port Save Save the set parameters to the TX board 3 4 2 2 Sync ...

Страница 19: ...d Refresh Select the corresponding phase channel and click Refresh The antenna will collect the ambient data and upload it to the system for synchronization To facilitate system synchronization please select the channel with the best signal for configuration If signal interference of the channel is very large choose one of the antennas to reduce the sensitivity of the hardware J10 on the RX board ...

Страница 20: ... will collect the ambient data and upload it for display In order to facilitate system synchronization please select the channel with the best signal and least interference for debugging Channel selection Click Left select the system phase as the starting point move the mouse to the ambient data other phases as the end point and the system will automatically calculate the phase difference The calc...

Страница 21: ...on Input the obtained phase difference value into Phase in Parameter Setting and click Set and Save If you observe that the noise and signal displayed by the channel signal are the smallest it means phase synchronization is completed Phase sync ...

Страница 22: ... whether the power supply is normal Settled New Parameter This record will automatically appear when you change the relevant parameter settings Function Key Clear Click Clear to clear the screen Query Click Query to upload the antenna record data and save the most recent 255 records at most Save Click Save to save the record to a specified file 3 4 2 5 Deployment Guidance of Acousto Magnetic Anten...

Страница 23: ...o replica antennas Channel widths About 6 m 8 m Two primary and two replica antennas Channel widths About 8 m 10 m Two primary and three replica antennas By analogy one primary antenna can work with two replica antennas and the primary antenna can also work alone which can greatly meet the requirements of different channel widths ...

Страница 24: ...pdates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protection to device especially storage devices For example place the device in a special computer room...

Страница 25: ... sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in without authorization Check device log By viewing the ...

Страница 26: ...User s Manual 21 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device ...

Страница 27: ......

Отзывы: