Dahua ECA3A1 Скачать руководство пользователя страница 26

Installation Manual 

 

We suggest you to change default HTTP and other service ports into any set of numbers 
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are 
using. 

6.

 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7.

 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus 
reducing the risk of ARP spoofing. 

8.

 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them. 

9.

 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 
reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

 

SNMP:  Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10.

 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that you 
use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11.

 

Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the device is 
logged in without authorization. 

 

Check equipment log: By viewing the logs, you can know the IP addresses that were used 
to log in to your devices and their key operations. 

12.

 

Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to 
save the log for a long time, it is recommended that you enable the network log function to 
ensure that the critical logs are synchronized to the network log server for tracing. 

13.

 

Construct a Safe Network Environment 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 
recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 
devices from external network. 

 

The network should be partitioned and isolated according to the actual network needs. If 
there are no communication requirements between two sub networks, it is suggested to 
use VLAN, network GAP and other technologies to partition the network, so as to achieve 
the network isolation effect. 

Содержание ECA3A1

Страница 1: ...Installation Manual Installation Manual V1 0 0 Explosion Proof IR Camera ECA3A1 Installation Manual Ex mark Exdb C T6 Gb Ex tb IIIC T80 C Db ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 1...

Страница 2: ...ormation as the emphasis and supplement to the text Revision History Version Revision Content Release Time V1 0 1 Updated explosion proof structure description October 2020 V1 0 0 First release June 2...

Страница 3: ...to our final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks registered trademarks and the company names in...

Страница 4: ...he Camera leaves the factory When connected to the explosion proof control cabinet the control cable shall be protected by explosion proof flexible tube Make sure that all the explosion proof componen...

Страница 5: ...shore platform Cameras with medium salt spray tolerance level can be installed in an area 1500 meters away from the sea Cameras not salt spray tolerant can only be installed in an area 3000 m away fro...

Страница 6: ...field Keep the Camera away from fire source and do not store it with corrosive inflammable and explosive materials If the Camera has been stored in the company for more than 18 months it should be re...

Страница 7: ...essories and Tools 6 3 1 Connecting Cable and Flexible Tube 7 3 2 3 2 1 Cable Description 7 3 2 2 Connecting Explosion Proof Flexible Tube 7 Installing the Camera 9 3 3 3 3 1 Precautions 9 3 3 2 Proce...

Страница 8: ...ontact local supplier or customer service center The product is subject to change without further notice If there is any question or dispute refer to our final explanation Packing list Figure 1 1 No N...

Страница 9: ...Flameproof Enclosures d The enclosure is rust proof and it is rated IP68 The Camera can be widely used in oil chemical engineering wharf port mine aerospace military food processing and other sites A...

Страница 10: ...ation window is made of tempered glass and it has passed impulse test and thermal shock test IP68 2 m 2 h The Camera adopts compression nut equipment to lead the cable in which makes the cable fully c...

Страница 11: ...ecification 2 6 Table 2 2 Mechanical specification Parameter Description Material Stainless steel 304 by default stainless steel 316L customizable IP rating IP68 Cable outlet hole 1 Cable outlet hole...

Страница 12: ...er consumption 12 W Electrical connection There are power network and audio ports on the control cable by default A flexible cube is needed to connect these ports Environment Requirements 2 8 Table 2...

Страница 13: ...era to power supply specified in 2 7 Electric Specification Always use the Camera under the air pressure operating temperature and operating humidity specified in 2 8 Environment Requirements Explosio...

Страница 14: ...f flexible tube and then led into explosion proof control cabinet to connect to the system bus Table 3 2 Cable description Cable Function Description Power DC 12V Red DC 12V Black Grounding Yellow and...

Страница 15: ...cription No Description 1 Explosion flexible tube 2 Outlet hole Tighten the thread connector and then the explosion flexible tube Keep the silicone ring Step 2 and metal gasket provided with the Camer...

Страница 16: ...attached at the Camera rear to the hole on the bracket when installing the Camera Use explosion proof flexible tube to protect the cable when connecting it to the control cabinet 3 3 2 Procedure Fix...

Страница 17: ...Installation Manual 10 Fix the camera Figure 3 5 Connect the cables among the Camera bracket flexible tube and control cabinet Step 3 Installation and cable layout Figure 3 6...

Страница 18: ...5 Installation and cable layout No Description 1 Wall 2 4 M6 expansion screws used to fix the bracket on the wall 3 Wall mount bracket 4 Flexible tube 5 Junction box 6 Flexible tube 7 Galvanized steel...

Страница 19: ...r supply is normal Video signal cable is in poor contact Check whether the video signal cable is normal Intermittent image Video signal cable is in poor contact Check whether the video signal cable is...

Страница 20: ...ends of steel tubes Laying overhead power cables is prohibited At places with severe thunderstorms and induced voltage like substation high powered lightning protection devices and lightning conducto...

Страница 21: ...n 4 5 The radius is 60 m 6 Lightning conductor 7 Steel tube Appendix Figure 1 2 Install lightning protection devices 2 R The radius of the circle and R 60 m L1 The length of the pole that holds the li...

Страница 22: ...whose cross sectional area are not less than 25 mm2 to connect the yellow green ground cable ground screws to the indoor equipotential earthing terminals Appendix Figure 1 3 Install lightning protecti...

Страница 23: ...3 37 23 190 83 58 16 298 17 90 88 763 31 232 66 10 61 06 18 61 95 41 29 08 149 08 45 44 381 66 116 33 15 40 71 12 41 63 61 19 39 99 39 30 29 254 44 77 55 20 30 53 9 31 47 71 14 54 74 54 22 72 190 83 5...

Страница 24: ...110 37 41 0 00950 0 130 36 39 0 01327 0 140 35 0 01539 0 160 34 37 0 02011 0 180 33 0 02545 0 200 32 35 0 03142 0 230 31 0 04115 0 250 30 33 0 04909 0 290 29 31 0 06605 0 330 28 30 0 08553 0 350 27 29...

Страница 25: ...r updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations...

Страница 26: ...ur audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission R...

Страница 27: ...nual Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks Enable IP MAC address filtering function to limit the range of hosts allowed to acc...

Страница 28: ......

Отзывы: