Dahua ITC439-PW1H-LZ Скачать руководство пользователя страница 17

 

11 

Appendix 1 Cybersecurity Recommendations 

Mandatory actions to be taken for basic equipment network security:

 

1. 

Use Strong Passwords

 

Please refer to the following suggestions to set passwords: 

  The length should not be less than 8 characters. 

  Include at least two types of characters; character types include upper and lower case letters, 

numbers and symbols. 

  Do not contain the account name or the account name in reverse order. 

  Do not use continuous characters, such as 123, abc, etc. 

  Do not use overlapped characters, such as 111, aaa, etc. 

2. 

Update Firmware and Client Software in Time

 

  According to the standard procedure in Tech-industry, we recommend to keep your 

equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is 
equipped with the latest security patches and fixes. When the equipment is connected to the 
public network, it is recommended to enable the “auto-check for updates” function to obtain 
timely information of firmware updates released by the manufacturer. 

  We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your equipment network security:

 

1. 

Physical Protection

 

We suggest that you perform physical protection to equipment, especially storage devices. For 
example, place the equipment in a special computer room and cabinet, and implement 
well-done access control permission and key management to prevent unauthorized personnel 
from carrying out physical contacts such as damaging hardware, unauthorized connection of 
removable equipment (such as USB flash disk, serial port), etc. 

2. 

Change Passwords Regularly

 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3. 

Set and Update Passwords Reset Information Timely

 

The device supports password reset function. Please set up related information for password 
reset in time, including the end user’s mailbox and password protection questions. If the 
information changes, please modify it in time. When setting password protection questions, it is 
suggested not to use those that can be easily guessed. 

4. 

Enable Account Lock

 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password several 
times, the corresponding account and the source IP address will be locked. 

5. 

Change Default HTTP and Other Service Ports

 

We suggest you to change default HTTP and other service ports into any set of numbers between 
1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6. 

Enable HTTPS

 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 
channel. 

7. 

MAC Address Binding

 

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus 

Содержание ITC439-PW1H-LZ

Страница 1: ...Outdoor Parking Space Detector Quick Start Guide V1 0 0...

Страница 2: ...ve time Provides additional information as a supplement to the text Revision History Version Revision Content Release Time V1 0 0 First release January 2022 Privacy Protection Notice As the device use...

Страница 3: ...atest program and supplementary documentation There might be errors in the print or deviations in the description of the functions operations and technical data If there is any doubt or dispute we res...

Страница 4: ...d safety belts Do not place the device in a place exposed to sunlight or near heat sources Keep the device away from dampness dust and soot Put the device in a well ventilated place and do not block i...

Страница 5: ...nce Make sure that the power supply of the device is connected to a power socket with protective earthing The device must be used with the protective cover for outdoor scenarios to avoid the risk of w...

Страница 6: ...1 4 Cables 2 2 Installation 4 2 1 Installation Requirements 4 2 2 Installing the Camera 4 3 Camera Configurations 6 3 1 Initialization 6 3 2 Changing IP Address 6 3 3 Login 7 3 4 Parking Space Config...

Страница 7: ...1 1 Overview 1 1 Appearance Figure 1 1 ITC439 PW1H Z Figure 1 2 ITC439 PW1H Z1050 1 2 Dimensions Figure 1 3 ITC439 PW1H Z mm inch Figure 1 4 ITC439 PW1H Z1050 mm inch 1 3 Structure...

Страница 8: ...2 Figure 1 5 Structure Figure 1 6 Rear panel 1 4 Cables Figure 1 7 External cables...

Страница 9: ...d pink ALARM_NO2 Light green ALARM_COM2 Red ALARM_NO3 Black ALARM_COM3 Alarm input Blue ALARM_IN1 White ALARM_IN2 Yellow ALARM_IN3 5 24 VAC Inputs 24 VAC power supply Make sure to supply power to the...

Страница 10: ...is blocked by other vehicles make sure the blockage is less than 40 The Camera can only recognize small vehicles Large vehicles such as a truck might not be recognized The recognition is ensured only...

Страница 11: ...cket Step 1 Use M6 14 screws to fix the universal joint on the bracket Step 2 Use two 1 4 20 14UNC screws to fix the camera on the universal bracket Figure 2 4 Universal bracket installation Step 3 Ad...

Страница 12: ...ep 2 Open browser enter the IP address of the Camera in the address bar and then press the Enter key Figure 3 1 Device Initialization Step 3 Enter and confirm the password The password must consist of...

Страница 13: ...rd and then click Login Step 3 For first time login click Please click here to download and install the plug in and then install the plug in according to system prompt Before installing the plug in ma...

Страница 14: ...e Spaces Set a parking zone and divide parking areas inside the zone so the Camera can monitor parking spaces in each area and output available spaces in real time Step 1 Select Setting ITC Park Space...

Страница 15: ...ured parking area 1 Click on the video image draw a parking area according to the actual site and then right click to finish 2 On the left side set the parking region name the number of vehicles that...

Страница 16: ...pages might vary depending on the device model Figure 4 1 Upgrade Step 3 Click Import to select the update file and then click Upgrade to update the system Do not disconnect the power or network or r...

Страница 17: ...room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware unauthorized conn...

Страница 18: ...we suggest that you check online users regularly to see if the device is logged in without authorization Check equipment log By viewing the logs you can know the IP addresses that were used to log in...

Отзывы: