NVR
-
4416P16
-
H2/F User’s manual (short) ver.1.1
All rights reserved © AAT SYSTEMY BEZPIECZEŃSTWA Sp. z o.o.
11
WARNING!
Below are shown security recommendations for
network architecture and
configuration
of
CCTV
systems
that are connected to
the Internet
to
reduce the risk
of
unauthorized
interference with the
system
by a third party.
2.6. Security recommendations for
network architecture and
configuration
1.
Absolutely change the default
passwords
and
user
names
(if the device
gives
this possibility) of
all
applied
network devices (recorders,
cameras, routers,
network switches, etc.)
to
the
severely
complexity password.
Use lowercase and
uppercase letters,
numbers, and
special characters
if
there is such possibility.
2. Depending on the available functionality in the order to restrict access to the used network devices at
the administrator account level, it is recommended to configure the users accounts accordingly.
3. Do not use DMZ function (Demilitarized zone) in your router. Using that function you open the
access to recorder system from the Internet on all ports, which gives possibility for an unauthorized
interference with the system.
Instead of
DMZ
use
port forwarding
redirect only the ports which are
necessary for the performance
of
the
connection (detailed
information about ports of communication
in different
models of
recorders,
cameras,
etc.
can be found in the operating instructions).
STARTING THE DEVICE
PC
ROUTER
POE IP CAMERAS
IP
CAMERAS
URUCHAMIANIE URZĄDZENIA
URUCHAMIANIE URZĄDZENIA
INTERNET