background image

MARGIN

GUIDES

Stay within the yellow 

box. Do not let text go 

beyond, instead move 

to the next column or 

start a new page. 

9  

|  

www.icrealtime.com

Change  Default  HTTP  and  Other  Service  Ports.  It  is 

recommended  to  change  default  HTTP  and  other  service 

ports  into  any  set  of  numbers  between  1024~65535, 

reducing  the  risk  of  outsiders  being  able  to  guess  which 

ports you are using.

Enable HTTPS. It is recommended  to  enable  HTTPS,  so  

that    you    visit    Web    service    through    a    secure 

communication channel.

Enable Whitelist. It is recommended  to  enable  whitelist  

function    to    prevent    everyone,    except    those    with 

specified  IP  addresses,  from  accessing  the  system. 

Therefore,  please  be  sure  to  add  your  computer’s  IP 

address and the accompanying equipment’s IP address to 

the whitelist.

MAC  Address  Reservation/  Binding.  It  is  recommended  

to  bind  the  IP  and  MAC  address  of  the  gateway  to  

the  equipment, thus reducing the risk of ARP spoofing.

Assign  Accounts  and  Privileges  Responsibly.  In 

accordance  to  business  and  management  requirements, 

add  users  and  assign  a  minimum  set  of  permissions  to 

them.

Disable Unnecessary Services and Choose Secure Modes

If not needed, it is recommended to turn off some services 

such  as  SNMP,  SMTP,  UPnP,  etc.,  to  reduce  risks.  If 

necessary,  it  is  highly  recommended  that  you  use  safe 

modes, including but not limited to the following services: 

SNMP:  Choose  SNMP  v3,  and  set  up  strong  encryption 

passwords and authentication passwords. SMTP: Choose 

TLS to access mailbox server. FTP: Choose SFTP, and set 

up  strong  passwords.  AP  hotspot:  Choose  WPA2-PSK 

encryption mode, and set up strong passwords

Audio  and  Video  Encrypted  Transmission.  If  your  audio 

and  video  data  contents  are  very  important  or  sensitive, 

we  recommend  that  you  use  encrypted  transmission 

function to reduce the risk of audio and video data being 

stolen  during  transmission.  Reminder:  encrypted 

transmission  will  cause  some  loss  in  transmission 

efficiency.

Secure Auditing. Check  online  users:  we  suggest  that  

you  check  online  users regularly  to  see  if  the device is 

logged in without authorization. Check equipment log: By 

viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations.

Network  Log.  Due  to  the  limited  storage  capacity  of  the 

equipment, the stored log is limited. If you need to save the 

log for a long time, it is recommended that you enable the 

network  log  function  to  ensure  that  the  critical  logs  are 

synchronized to the network log server for tracing

Construct  a  Safe  Network  Environment.  In    order    to  

better    ensure    the    safety    of    equipment    and    reduce  

potential  cyber  risks,  we recommend:

Disable the port mapping function of the router to 

avoid  direct  access  to  the  intranet  devices  from 

external network. 

The  network  should  be  partitioned  and  isolated 

according to the actual network needs. If  there  are  

no    communication    requirements    between    two  

sub    networks,    it    is  suggested  to  use  VLAN, 

network  GAP  and  other  technologies  to  partition 

the network, so as to achieve the network isolation 

effect.

Establish the 802.1x access authentication system 

to reduce the risk of unauthorized access to private 

networks.

Содержание Mini 1U Series

Страница 1: ...e the device arbitrarily Transport use and store the device within allowed humidity and temperature range Electrical Safety Improper battery use might result in re explosion or in ammation When replac...

Страница 2: ...y differ depending on the model purchased 1 Power Input Port 2 Power On Off Switch 3 PoE ports for IP camera connection 4 Ethernet Port to local network 5 VGA Port 6 HDMI Port 7 Audio Input Output for...

Страница 3: ...priate language then click next DEVICE INITIALIZATION cont Draw an unlock pattern to use in place of a password Click skip if you do not want to use an unlock pattern Figure 4 2 2 1 2 Security Create...

Страница 4: ...address manually if using a static IP address 1 4 P2P Keep P2P enabled for easy remote access 2C STARTUP WIZARD 1 1 General Settings General settings can be left at default Change Auto Logout to 0 min...

Страница 5: ...annels 3A Accessing Web Interface Open the browser and enter the IP address of the Device into the address bar Press Enter key The Login interface is displayed Enter the username admin and the passwor...

Страница 6: ...Online or Connect Success Open the phone app ICRSS Pro or IC VIew and go to the Main Menu Device Manager Tap on the icon on the upper right Select Wired Device then tap on P2P Input a name tap on the...

Страница 7: ...ve to use Internet Explorer to initialize the plugin If you re already using Internet Explorer reinstall the plugin by deleting the webrec and webplugin exe folders within C Program Files and or C Pro...

Страница 8: ...to check for updates function to obtain timely information of rmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recomm...

Страница 9: ...ot Choose WPA2 PSK encryption mode and set up strong passwords Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive we recommend that you use en...

Отзывы: