Dahua DHI-ITSJC-2302-DC12 Скачать руководство пользователя страница 24

User’s Manual 

18

 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We  suggest  you  to  enable  HTTPS,  so  that  you  visit  Web  service  through  a  secure 

communication channel. 

7.  Enable Whitelist 

We  suggest  you  to  enable  whitelist  function  to  prevent  everyone,  except  those  with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.  MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment, 

thus reducing the risk of ARP spoofing. 

9.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them. 

10.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.  Secure Auditing 

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization. 

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14.  Construct a Safe Network Environment 

In  order  to  better  ensure  the  safety  of  equipment  and  reduce  potential  cyber  risks,  we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

Содержание DHI-ITSJC-2302-DC12

Страница 1: ...79GHz Anti smashing Radar User s Manual V1 0 0 V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Страница 2: ...otential risk which if not avoided could result in property damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides...

Страница 3: ...still might be deviation in technical data functions and operations description or errors in print If there is any doubt or dispute we reserve the right of final explanation Upgrade the reader softwar...

Страница 4: ...d as far away from the Radar as possible Do not dissemble the Radar Clean the surface of the Radar with a soft dry cloth or a clean soft cloth dipped in neutral detergent and then dry the surface WARN...

Страница 5: ...allowed humidity and temperature conditions Prevent any liquid from flowing into the Radar Install the Radar in a well ventilated place and do not block the ventilation of the Radar Do not press vibra...

Страница 6: ...Snapshot 3 3 2 2 Radar for Anti smashing 5 Wiring 7 3 3 3 3 1 Cable Description 7 3 3 2 Cable Connection 8 4 Configuration on Mobile App 9 Connecting Your Phone to Radar Wi Fi 9 4 1 Connecting App to...

Страница 7: ...terference suitable for advertising barriers fence arm barriers straight arm barriers and folding arm barriers Uses MIMO multiple input multiple output technology to recognize movement directions of t...

Страница 8: ...User s Manual 2 2 Appearance and Structure Appearance 2 1 Appearance Figure 2 1 Dimensions 2 2 Dimensions mm inch Figure 2 2...

Страница 9: ...0 ft away from the ground Installation example Figure 3 1 When installing the Radar on the casing of the barrier the casing must be stable jittering angle no more than 5 to ensure the detection accur...

Страница 10: ...y from the ground 70 cm 27 6 is recommended when large trucks are frequently seen 2 Fix the rear plate of the Radar to the mounting pole by using 4 flange screws 3 Fix the Radar to the rear plate by u...

Страница 11: ...ill two 5 mm 0 2 circular holes holes B and C The distance between holes A and B is 39 mm 1 5 and the distance between holes A and C is 85 mm 3 3 Hole size mm Figure 3 5 Fix the Radar Step 2 1 Install...

Страница 12: ...User s Manual 6 Waterproof joint installation Figure 3 6 1 Front cover 2 Rear cover 3 Waterproof joint Fix the Radar Figure 3 7 Installation completed Figure 3 8...

Страница 13: ...the barrier arm Right Width and Left Width should be more than 0 5 m 1 6 ft to avoid interference from the barrier arm and ensure radar detection accuracy You can set the widths on the mobile app STJ7...

Страница 14: ...indicator on the Radar indicates that the power supply is normal Connect the Radar to camera Alarm Connect J1 1 brown and J1 2 yellow to alarm output ports of camera RS 485 communication Connect T R b...

Страница 15: ...6789 by default Wi Fi connection Figure 4 1 Connecting App to Radar 4 2 Scan the QR code provided in the accessory to download and install the STJ79 app Step 1 and an icon is generated on the desktop...

Страница 16: ...Manual 10 Wi Ficonnection Figure 4 2 4 2 1 Setting Radar Parameters In the Parameter section tap Basic Parameter Setting and Advanced Parameter Setting to set the parameters Set basic parameters Figu...

Страница 17: ...h Detection width at the left or right side of the radar normal line Value range 0 1 0 1 0 by default How to tell the left or right side The left or right side of the Radar when you face the Radar and...

Страница 18: ...t and then tap Update The firmware upgrade starts Standby Mode is recommended when the above upgrade method failed or the Radar crashed Firmware upgrade Figure 4 5 4 2 3 Modifying Wi Fi Information In...

Страница 19: ...t is detected a green dot will show at the target s position See Figure 4 7 If the green indicator keeps on meaning target is detected after the Radar is installed you can check whether there is inter...

Страница 20: ...User s Manual 14 View real time data Figure 4 7...

Страница 21: ...1 minute the green indicator keeps on and the barrier arm does not jitter or hit the vehicle The barrier arm does not hit people When the barrier arm is falling after a vehicle leaves a person passes...

Страница 22: ...is metal object within the radar detection range If yes move the object away For objects that cannot be moved reduce the radar detection distance and width until them get out of the detection range o...

Страница 23: ...able the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice t...

Страница 24: ...services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose...

Страница 25: ...sted to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unaut...

Страница 26: ...User s Manual...

Отзывы: