
Service Configuration
1. Enable HTTPS
It is recommended that you enable HTTPS to access Web services through secure channels.
2. Encrypted transmission of audio and video
If your audio and video data contents are very important or sensitive, we recommend you to use
encrypted transmission function in order to reduce the risk of your audio and video data being
eavesdropped during transmission.
3. Turn off non-essential services and use safe mode
If not needed, it is recommended to turn off some services such as SSH, SNMP, SMTP, UPnP, AP
hotspot etc., to reduce the attack surfaces.
If necessary, it is highly recommended to choose safe modes, including but not limited to the
following services:
●
SNMP: Choose SNMP v3, and set up strong encryption and authentication passwords.
●
SMTP: Choose TLS to access mailbox server.
●
FTP: Choose SFTP, and set up complex passwords.
●
AP hotspot: Choose WPA2-PSK encryption mode, and set up complex passwords.
4. Change HTTP and other default service ports
It is recommended that you change the default port of HTTP and other services to any port
between 1024 and 65535 to reduce the risk of being guessed by threat actors.
Network Configuration
1. Enable Allow list
It is recommended that you turn on the allow list function, and only allow IP in the allow list to
access the device. Therefore, please be sure to add your computer IP address and supporting
device IP address to the allow list.
2. MAC address binding
It is recommended that you bind the IP address of the gateway to the MAC address on the
device to reduce the risk of ARP spoofing.
3. Build a secure network environment
In order to better ensure the security of devices and reduce potential cyber risks, the following
are recommended:
●
Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network;
●
According to the actual network needs, partition the network: if there is no communication
demand between the two subnets, it is recommended to use VLAN, gateway and other
methods to partition the network to achieve network isolation;
●
Stablish 802.1x access authentication system to reduce the risk of illegal terminal access to
the private network.
Security Auditing
1. Check online users
It is recommended to check online users regularly to identify illegal users.
2. Check device log
Quick Start Guide
15
Содержание HS4408-4ET-96
Страница 24: ......