Dahua LCH75 Скачать руководство пользователя страница 18

Quick Start Guide 

12 

1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 

6.  Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 

channel. 

7.  MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the equipment, thus 

reducing the risk of ARP spoofing. 

8.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them. 

9.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 

reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to the 

following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords.   

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that you 

use encrypted transmission function, to reduce the risk of audio and video data being stolen 

during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. Secure Auditing 

  Check online users: we suggest that you check online users regularly to see if the device is 

logged in without authorization.   

  Check equipment log: By viewing the logs, you can know the IP addresses that were used to 

log in to your devices and their key operations. 

12. Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need to 

save the log for a long time, it is recommended that you enable the network log function to 

ensure that the critical logs are synchronized to the network log server for tracing. 

13. Construct a Safe Network Environment 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 

recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 

VLAN, network GAP and other technologies to partition the network, so as to achieve the 

network isolation effect. 

  Establish the 802.1x access authentication system to reduce the risk of unauthorized access to 

private networks. 

Содержание LCH75

Страница 1: ...Smart Interactive Whiteboard Quick Start Guide ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 0...

Страница 2: ...he personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate right...

Страница 3: ...l data If there is any doubt or dispute we reserve the right of final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All t...

Страница 4: ...d is a class I electrical appliance Make sure that the power supply of the whiteboard is connected to a power socket with protective earthing The appliance coupler is a disconnection device Keep a con...

Страница 5: ...is connected to a power socket with protective earthing The appliance coupler is a disconnection device Keep a convenient angle when using it Maintenance Requirements Unplug the power cord before clea...

Страница 6: ...nts Foreword I Important Safeguards and Warnings III 1 Introduction 1 2 Packing List 2 3 Installation 3 3 1 Installation Accessories 3 3 2 Tools 3 3 3 Installation Procedure 4 4 Appearance 8 Appendix...

Страница 7: ...ier application and central control system The whiteboard has the following characteristics Supports 4K HD LCD display Supports switch between Android and Windows systems you need to install a PC modu...

Страница 8: ...k the box and check whether the components are complete according to the packing list Table 2 1 Packing list Name Quantity Name Quantity Smart interactive whiteboard 1 Power cord 1 Stylus pen 2 Quick...

Страница 9: ...Accessory description No Name No Name 1 Installation bracket 7 5 6 8 4PCS M D 2 Wallboard 1 8 13 6 5 15 4PCS M E 3 Hook 2 9 M6 50 6PCS W A 4 M5 25 4PCS M A 10 10 50 6PCS W B 5 M6 25 4PCS M B 11 6 6PC...

Страница 10: ...Quick Start Guide 4 Figure 3 2 Electric drill Figure 3 3 Screwdriver 3 3 Installation Procedure Step 1 Mark installation positions on the wall and then drill holes at the marked positions...

Страница 11: ...e 5 Figure 3 4 Required hole diameter and depth Step 2 Install the wallboard onto the wall and keep it horizontal Figure 3 5 Install wallboard Step 3 Install the hooks on the rear panel of the whitebo...

Страница 12: ...as spare If thicker gaskets are used install the gaskets between the whiteboard and hooks Figure 3 6 Install hooks Figure 3 7 Install gasket Step 4 Hang the whiteboard on the wallboard through the ho...

Страница 13: ...Quick Start Guide 7 Figure 3 8 Tighten hooks...

Страница 14: ...Quick Start Guide 8 4 Appearance Figure 4 1 Appearance without camera...

Страница 15: ...nd blue when the whiteboard is in normal use 7 Light sensor The whiteboard recognizes the ambient brightness through the light sensor and adjusts the backlight brightness automatically 8 IR sensor Rec...

Страница 16: ...etwork cable to access network 3 Transmits touch signals 4 Connects to USB devices such as mobile hard disk USB flash drive USB keyboard and USB mouse It is applicable to Android system and PC module...

Страница 17: ...mation of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your equipment network securi...

Страница 18: ...ansmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check...

Страница 19: ...dress filtering function to limit the range of hosts allowed to access the device More information Please visit Dahua official website security emergency response center for security announcements and...

Страница 20: ...Quick Start Guide...

Страница 21: ...1 2 51 32 16489 001 Class B RF 70 105mm 80g 2010812 1 2 51 32 16489 001 V1 1 0 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16...

Отзывы: