background image

 

Cybersecurity  Recommendations    29 

 Cybersecurity Recommendations 

Appendix 1

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 

steps toward protecting and strengthening networks and networked appliances will make them 

less  susceptible  to  attacks.  Below  are  some  tips  and  recommendations  on  how  to  create  a 

more secured security system. 

Mandatory actions to be taken for basic equipment network security: 

1.  Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 

letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.  Update Firmware and Client Software in Time 

 

According  to  the  standard  procedure  in  Tech-industry,  we  recommend  to  keep  your 

equipment  (such  as  NVR,  DVR,  IP  camera,  etc.)  firmware  up-to-date  to  ensure  the 

system is equipped with the latest security patches and fixes. When the equipment is 
connected  to  the  public  network,  it  is  recommended  to  enable  the  “auto-check  for 
updat

es”  function  to  obtain  timely  information  of  firmware  updates  released  by  the 

manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your equipment network security: 

1.  Physical Protection 

We suggest that you perform physical protection to equipment, especially storage devices. 

For example, place the equipment in a special computer room and cabinet, and implement 

well-done  access  control  permission  and  key  management  to  prevent  unauthorized 

personnel from carrying out physical contacts such as damaging hardware, unauthorized 

connection of removable equipment (such as USB flash disk, serial port), etc. 

2.  Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 

cracked. 

3.  Set and Update Passwords Reset Information Timely 

The  equipment  supports  password  reset  function.  Please  set  up  related  information  for 
password  reset  in  time,  including  the  end  user’s  mailbox  and  password  protection 
questions.  If  the  information  changes,  please  modify  it  in  time.  When  setting  password 

protection questions, it is suggested not to use those that can be easily guessed. 

4.  Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

Содержание VTO4202F Series

Страница 1: ...Modular VTO VTO4202F P Quick Start Guide V1 0 1...

Страница 2: ...ld result in property damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides additional information as the emphasis...

Страница 3: ...written notice The product updates might cause some differences between the actual product and the manual Please contact the customer service for the latest program and supplementary documentation The...

Страница 4: ...e do not put on the device anything filled with liquids in order to prevent liquids from flowing into the device Install the device at well ventilated places do not block its ventilation opening Use t...

Страница 5: ...9 3 1 3 1 1 Installing on the Wall 9 3 1 2 Installing in the Wall 11 Horizontal Vertical Mounting 12 3 2 3 2 1 Horizontal Mounting 12 3 2 2 Vertical Mounting 13 Cascade Connection 13 3 3 4 Configurati...

Страница 6: ...e video communication system Function 1 2 Video call Make video calls on the modular VTO with VTH users Group call Call multiple VTH users at one VTO simultaneously Be monitored Videos captured by the...

Страница 7: ...2 1 Camera module front panel Figure 2 1 Table 2 1 Camera module front panel description No Name Description 1 Microphone Audio input 2 Camera Monitor area in front of the door 3 Speaker Audio output...

Страница 8: ...electric control lock solenoid lock and exit button See Figure 2 3 3 Ethernet Port Connected to network cables 4 Cascade connection port Connect other modules In case of cascade connection of multipl...

Страница 9: ...panel of audio module is the same as rear panel of camera module Audio module Figure 2 6 Table 2 5 Audio module description No Name Description 1 Microphone Audio input 2 Speaker Audio output Button M...

Страница 10: ...rectory Display user information according to buttons 2 Call button Call the VTH and call the management center you need to do seetings on the web first Five button module rear panel Figure 2 8 Table...

Страница 11: ...tons to select previous or next item 2 Numeric button Enter the password and VTH nombers For example unlock password is 123456 Enter 123456 3 Call button Press the button to start a call to VTH 4 Call...

Страница 12: ...ls of fingerprint module and button module have different port positions but port functions are the same Fingerprint module Figure 2 11 Display Module 2 8 Display module can be used for displaying use...

Страница 13: ...12 Blank Module 2 9 Blank module can be used for more attractive appearance when there is extra space Rear panels of blank module and button module have different port positions but port functions ar...

Страница 14: ...ing box and flush mounting box cables in the wall shall go through the bracket or mounting box Installing on in the Wall 3 1 3 1 1 Installing on the Wall Drill holes according to hole positions of the...

Страница 15: ...Installation 10 Apply silica gel to gaps Figure 3 1 Installing on the wall Figure 3 2...

Страница 16: ...box edge clings to Step 2 the wall Fix the rear panel on the mounting box with M2 8 screws Step 3 Connect cables Please refer to 2 Structure Step 4 Fix every module on the rear panel with M3 8 screws...

Страница 17: ...4 Horizontal mounting 2 Figure 3 5 When the VTO is horizontally mounted make sure that the tamper switch on the rear panel marked with 1 in Figure 3 4 is retracted so that once the VTO is dismantled t...

Страница 18: ...ear panel marked with 1 in Figure 3 5 is retracted so that once the VTO is dismantled tamper switch will be released and then alarms will be triggered The alarm will keep ringing for 15 seconds Cascad...

Страница 19: ...twork parameters See 4 2 3 Configuring Network Parameters 4 Configure SIP Server See 4 2 4 Selecting SIP Servers 5 Add VTO devices to the SIP server See 4 2 5 Adding VTO Devices 6 Add room number to t...

Страница 20: ...s recommended to finish this setting Click Next The initialization succeeded Step 5 Click OK Step 6 The Login interface is displayed See Figure 4 2 Login Figure 4 2 4 2 2 Configuring VTO Number The VT...

Страница 21: ...3 Select Local Setting Basic Step 2 The device properties are displayed See Figure 4 4 Device properties Figure 4 4 In the VTO No input box enter the VTO number you planned for this VTO and then Step...

Страница 22: ...list It applies to a scenario where there is only one building When the platform Express DSS works as SIP server select Express DSS from the Server Type drop down list It applies to a scenario where t...

Страница 23: ...e manually or wait for auto reboot to make the settings effective Log in to the web interface again Step 5 Select Network Setting SIP Server Step 6 The SIP Server interface is displayed See Figure 4 7...

Страница 24: ...u cannot call the VTS through VTO Port It is 5060 by default when other VTOs work as SIP server It is 5080 by default when the platform works as SIP server Username Password Use default value SIP Doma...

Страница 25: ...port Unit first 4 2 5 Adding VTO Devices You can add VTO devices to the SIP server and all the VTO devices connected to the same SIP server can make video call between each other This section applies...

Страница 26: ...terface of the target VTO Password Click Save Step 4 4 2 6 Adding Room Number You can add the planned room number to the SIP server and then configure the room number on VTH devices to connect them to...

Страница 27: ...Adding single room number 1 Click Add See Figure 4 11 The Add interface is displayed See Figure 4 12 Add single room number Figure 4 12 2 Configure room information See Table 4 3 Table 4 3 Room inform...

Страница 28: ...in One Layer First Floor Number and Second Floor Number according to the actual condition 2 Click the Add at the bottom See Figure 4 13 Add in batch Figure 4 13 All the added room numbers are display...

Страница 29: ...nnection position of the device on web interface is from top to bottom and from left to right Support adding multiple modules at the same time and saving the configurations Click Confirm and then rest...

Страница 30: ...25 Set modules Figure 4 15 Click Step 2 The Room List interface is displayed See Figure 4 16 The room no displayed on the interface corresponds to the added VTH 888888 is the Centre Call No Room list...

Страница 31: ...Figure 4 17 Room No information Figure 4 17 Click Confirm and then restart the browser to make the configurations take effective Step 4 save the settings Verifying Configuration 4 3 4 3 1 Calling VTH...

Страница 32: ...r the call Step 3 4 3 2 Doing Monitor from VTH On the main interface of the VTH select Monitor Door Step 1 The Door interface is displayed See Figure 4 19 Door Figure 4 19 Select the VTO you need to d...

Страница 33: ...Configuration 28 Monitor screen Figure 4 20...

Страница 34: ...ed to enable the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client softwar...

Страница 35: ...llowing services SNMP Choose SNMP v3 and set up strong encryption passwords and authentication passwords SMTP Choose TLS to access mailbox server FTP Choose SFTP and set up strong passwords AP hotspot...

Страница 36: ...s If there are no communication requirements between two sub networks it is suggested to use VLAN network GAP and other technologies to partition the network so as to achieve the network isolation eff...

Отзывы: