Dahua web 5.0 Скачать руководство пользователя страница 44

Operation Manual

Appendix 1 Recommendations for

cybersecurity

Cybersecurity is more than just a buzzword – it is something that pertains to every device that 
is connected to the Internet. IP video surveillance is not immune to cyber risks, but taking 
basic steps to protect and harden networks and network-connected devices will make them 
less susceptible to attack. Below are some tips and recommendations on how to create a 
more secure security system.

 Mandatory measures that you must take for the security of 

the basic equipment network:

1.

Use strong passwords

See the following tips for setting passwords:

The length cannot be less than 8 characters;

Include at least two types of characters: upper and lower case letters, numbers, and 
symbols;

Do not use account name or account name backwards.

Do not use continuous characters, such as 123, abc, etc.;

Do not use continuous repeating characters, such as 111, aaa, etc.;

two.

Update firmware and client software on time

As per the standard procedure in the technology industry, we recommend that you 
keep the firmware of your equipment (such as NVR, DVR, IP camera, etc.) up to date to 
ensure that the system is equipped with the latest patches and security fixes. When 
the equipment is connected to the public network, it is recommended to enable the 
"automatic update checking" function to obtain timely information about firmware 
updates published by the manufacturer.

We suggest that you download and use the latest version of the client software.

 

Recommended measures to improve the security of your computer's network:

1.

physical protection

We suggest that you physically protect your equipment, especially storage devices. For 
example, place the equipment in a dedicated computer room and cabinet and implement 
proper access control permission and key management to prevent unauthorized 
personnel from physically accessing the equipment and damaging the hardware, 
unauthorized connection to equipment removable (such as a USB flash disk, a serial port), 
etc.

two.

Change passwords periodically

We suggest that you change your passwords periodically to reduce the risk that they 
can be guessed or cracked.

3.

Establish and promptly update password reset information

The equipment supports the password reset function. Set up related information for 
timely password reset, including password protection questions and end-user email 
address. If the information changes, change it immediately. When setting password 
protection questions, we suggest that you do not use easily guessed ones.

Four.

Enable account lockout

The account lockout feature is enabled by default, and allows you to

37

Содержание web 5.0

Страница 1: ...web 5 0 network camera Operation Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 0 Translated from Spanish to English www onlinedoctranslator com...

Страница 2: ...ual product the actual product shall prevail We will not accept any responsibility for losses caused by using the device without following the instructions in the manual The manual will be updated in...

Страница 3: ...pany names in the manual are the property of their respective owners Please visit our website contact your dealer or customer service if you have problems using the device If there are uncertainties o...

Страница 4: ...will not be caused by device malfunction and may affect the life of the complementary metal oxide semiconductor CMOS Do not place the device in a humid dusty extremely hot or cold environment or in pl...

Страница 5: ...clean the device casing nor can you use a strong abrasive detergent The domed cover is an optical component Do not touch or clean the cover with your hands directly during installation or operation T...

Страница 6: ...5 1 Network 12 5 1 1 TCP IP 12 5 1 2 Port fifteen 5 1 3 Email 17 5 1 4 Basic service 19 5 2 Event twenty 5 2 1 Alarm input configuration twenty one 5 2 2 Establish alarm linkage 22 5 2 2 1 Add schedu...

Страница 7: ...Operation Manual 5 3 3 1 Requirements 33 5 3 3 2 Maintenance 3 4 5 3 3 3 Import Export 35 5 3 3 4 Default 35 5 3 4 Update 36 Appendix 1 Cybersecurity recommendations 37 SAW...

Страница 8: ...according to the number of channels For multi channel camera you can set the parameters for each channel 1 2 Network connection In the general IP camera IPC network topology the IPC connects to the PC...

Страница 9: ...ription Reference Open the IE browser and input the IP address to log in the web interface The IP address of the camera is 192 168 1 108 by default Access 3 Access Start the camera when you use it for...

Страница 10: ...e keep the password properly after startup and change it regularly When starting the device please keep the PC IP and the device IP in the same network Step 1 Open the Chrome browser enter the IP addr...

Страница 11: ...accept the terms of the Software License Agreement and the Privacy Policy I have read and agree to the terms of the Software License Agreement and Privacy Policy and then clickFollowing Next Figure 2...

Страница 12: ...ast two types of characters including uppercase lowercase numbers and special characters excluding Set a password with a height security level according to the password security notice Confirm Passwor...

Страница 13: ...Operation Manual Figure 2 5 P2P Scan the QR code on the actual screen 6...

Страница 14: ...oad and install the plugin for the first start of session Step 1 Open the Chrome browser enter the IP address of the camera 192 168 1 108 by default in the address bar and press Enter Step 2 Enter the...

Страница 15: ...nt security PTZ setting default import export remote auto maintenance and update Security Check the security status of the device and configure security features Recording Play or download recorded vi...

Страница 16: ...Operation Manual Figure 3 3 Login Step 2 Click onForgot password Forgot password to reset the password via the email address that was set at startup Figure 3 4 Login 9...

Страница 17: ...fferent models and the actual interface shall prevail Figure 4 1 live single channel Figure 4 2 live multi channel Table 4 1 description of the function bar No Function Description You can select the...

Страница 18: ...4 3 code bar main stream It has high bit and image transmission value with high resolution but also requires high bandwidth This option can be used for storage and monitoring Secondary transmission I...

Страница 19: ...and System settings 5 1 Network This section introduces the network settings 5 1 1 TCP IP You can set the IP address and DNS Domain Name System server and so on according to the network planning Previ...

Страница 20: ...ration Manual Figure 5 1 TCP IP Step 2 Configure the TCP IP parameters Table 5 1 description of TCP IP parameters Parameter Description Enter the host name the maximum length is 15 characters hostname...

Страница 21: ...t enabled the IP address cannot be set with the ping packet Demonstration of how to configure IP address with ARP Ping 1 Keep the camera to be configured and the PC within the same local network and t...

Страница 22: ...ss of the host IP version selectIPv4eitherIPv6 IP adress When you selectstatic Static inMode Mode enter the IP address and subnet mask you need Subnet mask IPv6 does not have a subnet mask access port...

Страница 23: ...configuration Table 5 2 port parameter description Parameter Description The maximum number of users web client platform client or mobile phone client that can connect to the device simultaneously Th...

Страница 24: ...hen channel 2 Subtype The type of bit transmission 0 means main transmission subtype 0 and 1 means secondary transmission subtype 1 RTSP port Example If you need the secondary stream of channel 2 from...

Страница 25: ...f the SMTP server Click on in the email and the sender information will not be displayed Anonymous Sender Sender s email address Select betweenNone None SSLYTLS encryption type For details see Table 5...

Страница 26: ...l send the test email at the set interval mail from verification Y For the configuration of the main mailboxes see Table 5 4 Table 5 4 Description of Mailbox settings mailbox SMTP server Authenticatio...

Страница 27: ...broadcast CGI Please enable the feature and then other devices can access through this service The feature is enabled by default Onvif Genetec Automatic notifications of the mobile Please enable this...

Страница 28: ...linkage Linkage of snapshots main task secondary task output linking alarm mail linking electronic 5 2 1Alarm input configuration When the device connected to the alarm input port triggers an alarm t...

Страница 29: ...2 Set Alarm Linkage If the existing schedules cannot meet the scene requirement you can clickadd schedule Add Schedule to add a new schedule For details see 5 2 2 1 Add Schedule Step 5 click onApply a...

Страница 30: ...igure 5 7 Alarm Linkage 5 2 2 1Add schedule Set arming periods The system only performs the corresponding binding action in the configured period Step 1 Click onadd schedule Add Schedule next toProgra...

Страница 31: ...Time Plan Table to add a new time plan table Can Double click on the table name to edit it Click to delete the history as required 5 2 2 2Record linkage The system can link the recording channel when...

Страница 32: ...arm is enabled Normal Movement Motion orAlarm Alarm the snapshot channel links the image capture Set recording linkage In the interface ofAlarm Alarm click snapshot and select the channel as required...

Страница 33: ...ils see 5 1 3 Email Figure 5 12 email link 5 3 System This section introduces the system settings including general date and time account security PTZ setting default import export remote auto mainten...

Страница 34: ...pply apply 5 3 1 2 Date and time You can set the date and time format time zone current time DST summer time or NTP server Step 1 select Date Time System System General General Essential Date and Time...

Страница 35: ...dministrator users The maximum length of the user or group name is 31 characters consisting of number letter underscore hyphen period and Password must consist of 8 to 32 non empty characters and cont...

Страница 36: ...Operation Manual System System Bill Account User user Step 1 select Figure 5 15 user Step 2 click onAdd add 29...

Страница 37: ...17 add user login restricted Step 3 Set user parameters Table 5 8 description of user parameters 1 Parameter Description Unique identification of the user You cannot use the existing username Usernam...

Страница 38: ...n the time range set as the validity period IP Address You can login to the web through the PC with the set IP Validity period You can log in to the web in the established validity period Time range Y...

Страница 39: ...can only reset the password by resetting the camera Step 3 Enter the reserved email address Step 4 click onApply apply besideEnable Enable onRestore password 5 3 2 2 ONVIF user You can add remove ONV...

Страница 40: ...ach group has different permissions Group name Step 4 click onTo accept OKAY The newly added user appears in the username list Related operations Click on to edit the password group note or permission...

Страница 41: ...aintenance Figure 5 21 maintenance Step 2 Set the parameters for automatic maintenance Click on besideauto reset Auto Reboot onRestart system Restart System and set the restart time the system automat...

Страница 42: ...to import the configuration file from the local system to the system Export clickExport configuration file Export Configuration File to export the system configuration file to local storage 5 3 3 4De...

Страница 43: ...he wrong update file was used please reboot the device otherwise some functions may not work properly Step 1 Select System System To update Upgrade Figure 24 update Step 2 Click onReview Browse and th...

Страница 44: ...e equipment is connected to the public network it is recommended to enable the automatic update checking function to obtain timely information about firmware updates published by the manufacturer We s...

Страница 45: ...ited to the following services SNMP Select SNMP v3 and set strong encryption passwords and authentication passwords SMTP Select TLS to access the mailbox server FTP Select SFTP and set strong password...

Страница 46: ...If there are no communication requirements between two subnets we suggest that you use VLAN network GAP and other technologies to partition the network so as to achieve the effect of network isolation...

Страница 47: ...OF SMARTER LIVING ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD Address No 1199 Bin an Road Binjiang District Hangzhou P R China Website www dahuasecurity com Zip Code 310053 Email overseas dahuatech com F...

Отзывы: