Dahua KTA02 Скачать руководство пользователя страница 16

11 

 

Cybersecurity Recommendations 

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 
steps toward protecting and strengthening networks and networked appliances will make them 
less  susceptible  to  attacks.  Below  are  some  tips  and  recommendations  on  how  to  create  a 
more secured security system. 

Mandatory actions to be taken for basic device network security: 

1. 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 
letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2. 

Update Firmware and Client Software in Time 

 

According  to  the  standard  procedure  in  Tech-industry,  we  recommend  to  keep  your 
device (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system 
is equipped with the latest security patches and fixes. When the device is connected 
to  the  public  network,  it  is  recommended  to  enable  the  “auto-check  for  updates” 
function  to  obtain  timely  information  of  firmware  updates  released  by  the 
manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your device network security: 

1. 

Physical Protection 

We suggest that you perform physical protection to device, especially storage devices. For 
example,  place  the  device  in  a  special  computer  room  and  cabinet,  and  implement 
well-done  access  control  permission  and  key  management  to  prevent  unauthorized 
personnel from carrying out physical contacts such as damaging hardware, unauthorized 
connection of removable device (such as USB flash disk, serial port), etc. 

2. 

Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 
cracked. 

3. 

Set and Update Passwords Reset Information Timely   

The  device  supports  password  reset  function.  Please  set  up  related  information  for 
password  reset  in  time,  including  the  end  user’s  mailbox  and  password  protection 
questions.  If  the  information  changes,  please  modify  it  in  time.  When  setting  password 
protection questions, it is suggested not to use those that can be easily guessed. 

4. 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 

5. 

Change Default HTTP and Other Service Ports 

Содержание KTA02

Страница 1: ...Analog 4 Wire Video Intercom Quick Start Guide V1 0 0...

Страница 2: ...me V1 0 0 First release August 2020 About the Manual The manual is for reference only If there is inconsistency between the manual and the actual product the actual product shall prevail We are not li...

Страница 3: ...rademarks registered trademarks and the company names in the manual are the properties of their respective owners Please visit our website contact the supplier or customer service if there is any prob...

Страница 4: ...evice at well ventilated places and do not block its ventilation opening Use the device only within rated input and output range Do not dismantle the device by yourself The device should be used with...

Страница 5: ...Installation 4 Indoor Monitor 4 Door Station 4 3 Wiring 6 Preparations 6 3 1 1 Port Connection Rules 6 3 1 2 Cord Specification 7 Wiring One Door Station and One Indoor Monitor 7 Wiring Three Door St...

Страница 6: ...to do voice and video calls The door station is installed outdoors and indoor monitor is installed indoors Features Indoor Monitor Real time video voice communication Can be connected to three door s...

Страница 7: ...espectively 6 When someone is calling press to open the door where the door station is installed 7 Power indicator 8 LCD screen 9 Microphone 10 Built in camera 11 Power indicator 12 Call button Press...

Страница 8: ...panel Table 1 2 Rear panel No Description No Description 1 Analog camera port 1 6 VTH cascading port 1 2 VTO port 1 7 VTH cascading port 2 3 VTO port 2 8 VTO hanging slot 4 Power input 9 Wires 5 Anal...

Страница 9: ...etween the device and the wall Indoor monitor installation Door Station Install the door station bracket on the wall and then hang the door station on the bracket or install the door station cover on...

Страница 10: ...5 Apply silicone sealant to the gap between the device and the wall...

Страница 11: ...connection rules Port A of an indoor monitor can be connected to Port C of another indoor monitor to do data communication Port B of an indoor monitor can be connected to Port D of another indoor mon...

Страница 12: ...erent specifications Table 3 1 Cord specification Transmission Distance TD RVV4 Cord Specification TD 10 m RVV4 0 3 mm 10 m TD 30 m RVV4 0 5 mm 30 m TD 50 m RVV4 0 75 mm If the distance between the do...

Страница 13: ...8 Wiring Three Door Stations and One Indoor Monitor Wiring 2...

Страница 14: ...9 Wiring Two Door Stations and Three Indoor Monitors Wiring 3 The recommended analog cameras CVBS are HAC 1230 series...

Страница 15: ...wn Vol volume Bright brightness Contrast and BellVol bell volume change Bell and turn off DND do not disturb Turn up Vol volume Bright brightness Contrast and BellVol bell volume change Bell and turn...

Страница 16: ...unction to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve...

Страница 17: ...ve we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmi...

Страница 18: ...13 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device...

Отзывы: