background image

 

14 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We  suggest  you  to  enable  HTTPS,  so  that  you  visit  Web  service  through  a  secure 

communication channel. 

7.  Enable Whitelist 

We  suggest  you  to  enable  whitelist  function  to  prevent  everyone,  except  those  with 

specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 

8.  MAC Address Binding 

We  recommend  you  to  bind  the  IP  and  MAC  address  of  the  gateway  to  the  equipment, 

thus reducing the risk of ARP spoofing. 

9.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign 

a minimum set of permissions to them. 

10.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited 

to the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and 

authentication passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

11.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

12.  Secure Auditing 

 

Check  online  users:  we  suggest  that  you  check  online  users  regularly  to  see  if  the 

device is logged in without authorization. 

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

13.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

14.  Construct a Safe Network Environment 

In  order  to  better  ensure  the  safety  of  equipment  and  reduce  potential  cyber  risks,  we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

 

The network should be partitioned and isolated according to the actual network needs. 

If  there  are  no  communication  requirements  between  two  sub  networks,  it  is 

Содержание DSS7016D-S2

Страница 1: ...DSS7016D S2 Quick Start Guide V1 0 0...

Страница 2: ...lated regions For detailed information see the paper User s manual CD ROM QR code or our official website If there is inconsistency between paper User s manual and the electronic version the electroni...

Страница 3: ...under the allowed humidity and temperature conditions Electrical Safety Improper battery use might result in fire explosion or inflammation When replacing battery make sure the same model is used Use...

Страница 4: ...2 1 Front Panel 2 1 2 2 Rear Panel 3 1 3 Connecting Cables 4 2 Local Applications 5 2 1 Function Architecture 5 2 2 System Configuration 6 2 2 1 Basic Settings 6 2 2 2 Network Settings 6 2 3 Operation...

Страница 5: ...ed pair 6 Mouse 1 USB 2 0 interface box packed 7 Terminal Board 1 bag 2 with 12 columns 2 with 8 columns 8 Panel Key 2 Universal for series product After confirming that the material and accessories a...

Страница 6: ...ght flashes during disk reading 3 Alarm indicator light The blue light flashes when the server triggers an alarm 4 Network indicator light The blue light flashes when network is well connected 5 USB 2...

Страница 7: ...efault port 4 SAS port Used to connect to expansion cabinet 5 eSATA port Supports eSATA device access 6 USB 3 0 port Two USB 3 0 ports for USB device access 7 Audio input or output port Blue RS 232 po...

Страница 8: ...4 1 3 Connecting Cables Connect cables according to port introduction and then connect the server to power...

Страница 9: ...Function Architecture The section introduces the local applications of the device See Figure 2 1 The local interface is displayed after the server is started See Figure 2 2 Figure 2 1 Local functions...

Страница 10: ...p it the same as local time Date Format Date and time format of the local system Date Separator Time Format Device Name It is the current product mode name by default Standby Time Set the inactivity d...

Страница 11: ...er one will automatically take over the job to ensure network stability Load balancing Multiple NICs share one IP and work at the same time to share the network load providing greater network capacity...

Страница 12: ...ay preferred DNS server address and alternate DNS server address Subnet Mask Preferred DNS Default Gateway Alternate DNS 2 3 Operation Management 2 3 1 Operation Analysis View the status of platform s...

Страница 13: ...9 Figure 2 6 Operation Analysis 2 Figure 2 7 Operation Analysis 3...

Страница 14: ...pper and lower flow of physical network port HDD Detection Real time detection of disk capacity temperature I O load and health Environment Detection Real time detection of CPU temperature usage fan s...

Страница 15: ...before reboot Shut down Save system data before shutting down Password Reset current password Reset Firewall Enable SSH 22 port to avoid whitelist configuration error of the Config System or access fa...

Страница 16: ...age map database and security For details see User s Manual Enter http IP config in the address bar of browser to go to the Config System The login interface is displayed See Figure 3 1 Server default...

Страница 17: ...s function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to impr...

Страница 18: ...TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot Choose WPA2 PSK encryption mode and set up strong passwords 11 Audio and Video Encrypted Transmission If your audio...

Страница 19: ...LAN network GAP and other technologies to partition the network so as to achieve the network isolation effect Establish the 802 1x access authentication system to reduce the risk of unauthorized acces...

Отзывы: