Operation Manual
Operation Manual
User’s Manual
V1.2.4
Foreword
This manual introduces the functions and operations of the VDPConfig (hereinafter referred to
as "the Tool").
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
TIPS Provides methods to help you solve a problem or save you time.
Revision History
Version Revision Content Release Time
1. Update "Initializing Devices".
V1.2.4 2. Add notice of "Local Upgrade." March 2020
3. Add "Single Ponit."
1. Add VTS function in "Project Configutation."
V1.2.3 September 2019
2. Update the operations of "Initializing Devices.”
1. Move the content of "configuring device" to the
Project Configuration as "Maintaince".
V1.2.2 2. Modify the SIP template. September 2018
3. Delete the VT system function of the Project
Configuration.
1. Add "Privacy Protection Notice".
V1.2.1 May 2018
2. Update "About the Manual".
1. Add "Project Configuration".
V1.2.0 2. Add "Configuring Alarm" and "Configuring January 2018
Arm/Disarm Settings".
1. Add "Cybersecurity Recommendations" and
V1.1.0 "Online Upgrade". October 2017
2. Update "The Main Interface".
I
Version Revision Content Release Time
1. Update "Basic Operations".
V1.0.2 May 2017
2. Add "Initializing Devices".
V1.0.1 Update the structure of the Basic Operations chapter. December 2016
V1.0.0 First release. February 2016
II
Table of Contents
Foreword .................................................................................................................................................... I
1 Overview ................................................................................................................................................. 1
1.1 General.......................................................................................................................................... 1
1.2 Main Interface ............................................................................................................................... 1
2 Basic Operations ................................................................................................................................... 4
2.1 Searching Devices ........................................................................................................................ 4
2.2 Adding Devices ............................................................................................................................. 5
2.2.1 Adding One Device ............................................................................................................. 5
2.2.2 Adding Multiple Devices ..................................................................................................... 6
2.3 Initializing Devices ........................................................................................................................ 8
2.4 Modifying IP ................................................................................................................................ 12
2.4.1 Modifying One IP .............................................................................................................. 12
2.4.2 Modifying IP in Batches .................................................................................................... 12
2.5 Configuring System Settings ...................................................................................................... 13
2.5.1 Timing ............................................................................................................................... 13
2.5.2 Rebooting and Restoring .................................................................................................. 15
2.5.3 Modifying and Resetting Password .................................................................................. 17
2.5.4 Configuring Alarm ............................................................................................................. 23
2.5.5 Configuring Arm/Disarm Settings ..................................................................................... 26
2.6 Local Upgrading .......................................................................................................................... 27
2.6.1 Upgrading One Device ..................................................................................................... 27
2.6.2 Upgrading Devices in Batches ......................................................................................... 29
2.7 Configuring the Template ............................................................................................................ 29
2.7.1 Creating a Template.......................................................................................................... 30
2.7.2 Applying the Template....................................................................................................... 32
2.8 Project Configuration .................................................................................................................. 34
2.8.1 Configuring SIP System Device ....................................................................................... 34
2.8.2 Configuring VTO and VTH ................................................................................................ 38
2.8.3 Configuring VTS ............................................................................................................... 40
2.8.4 Configuring VTH by Single Point ...................................................................................... 42
Appendix 1 Cybersecurity Recommendations ................................................................................... 45
III
1 Overview
Do not use the Tool with ConfigTool, Device Diagnostic Tool, SmartPSS (Smart Professional
Surveillance System) or DSS (Digital Surveillance System) at the same time; otherwise it might
cause device search abnormities.
1.1 General
You can use the Tool to configure and maintain the video intercom machines for home and
outdoor use by providing the following operations:
Initialize device.
Modify device IP.
Sync device time, reboot device, restore system default, modify password, reset device
password, and configure alarm and arm/disarm.
Export the configurations for video, audio, indoor machine, card management, access
password, and access QR code.
Upgrade device locally.
Quickly configure VTO, VTH and IPC under the same unit and configure corresponding
matching relationship.
After the Tool starts, it will search the devices according to the network segments setting in
Search setting.
After the installation, the Current Segment Search check box is selected by default in the
Search setting during the first login.
1
Figure 1-1 Main interface
: Quickly configure VTO, VTH and IPC under the same unit
and configure corresponding matching relationship.
System Provides access to check the Help file and software version, and set
3
settings update timeout and network timeout.
2
No. Function Description
6 Device list
Click to view device details.
3
2 Basic Operations
2.1 Searching Devices
You can search the devices through setting the current segment or other segment.
You can set the filtering conditions to search the needed device quickly.
Step 1 Click .
Figure 2-1 Modify IP
Step 2 Click .
Figure 2-2 Setting
4
Step 3 Select the searching way.
Current Segment Search
Select the Current Segment Search check box. Enter the username in the User
name box and the password in the Password box. The system will search the
devices accordingly.
Other Segment Search
Select the Other Segment Search check box. Enter the IP address in the Start IP
box and End IP box respectively. Enter the username in the User name box and
the password in the Password box. The system will search the devices
accordingly.
If you select both the Current Segment Search check box and the Other
Segment Search check box, the system searches devices under the both
conditions.
The username and the password are the ones used to log in to device.
Step 4 Click OK to start searching the devices.
The searched devices will appear in the device list on the main interface.
Make sure that the network is connected between the device and the PC which is installed with
the Tool; otherwise the Tool cannot find the device.
You can set the filtering conditions to search the wanted device quickly.
Step 1 Click .
Step 2 Click .
5
Figure 2-3 Manual add
You can add multiple devices through searching the current segment or other segment. For
details, see "2.1 Searching Devices."
6
2.2.2.2.1 Accessing to the Template
You can export the device details file and use it as a template to add or back up the device
details.
Step 1 Click .
Step 1 Find the template in the save path, and then open it.
7
Step 3 Save and close the template.
Step 1 Click .
Step 2 Click .
Step 3 Select the template, and then click Open.
The system starts importing the devices details. After the importing is completed, a
success notice is displayed.
Step 4 Click OK.
The newly imported devices appear in the device list.
Figure 2-5 Imported devices
8
Step 1 Click .
Step 2 Select an uninitialized device.
Step 3 Click .
Figure 2-6 Device initialization (1)
The interface might be different, and the actual product shall prevail.
If you do not provide the reserve information for password reset, you can reset
the password only through XML file.
Figure 2-7 Device initialization (2)
9
Table 2-3 Initialization parameters
Parameter Description
User name The username is admin by default.
Enter the new password. There is an indication for the strength of the new
password.
The password must consist of 8 to 32 non-blank characters and contain at
least two types of characters among upper case, lower case, number, and
special character (excluding ' " ; : &).
New Password
There are two setting rules for new password dependent on the devices.
Follow the instructions on the interface to set the new password.
After setting the new password, set the password again in the Search
setting.
Confirm
Confirm the new password.
Password
Selected by default.
Email Address
The email address will be used for password reset.
Step 6 Click Initialize.
Figure 2-8 Device initialization (3)
After initialization, you can click the success icon ( ) or click the failure icon ( ) for
the details.
10
Figure 2-9 Initializing devices
Only some device models support setting language when initializing; otherwise,
devices might fail to initialize.
Ensure and select the supported languages of devices; otherwise, devices might
fail to initialize.
It is recommended to initialize the same model devices at one time.
1) Click Language.
2) Select the needed language from the Language choose list.
Figure 2-10 Language selection
11
2.4 Modifying IP
You can modify IP for one or multiple devices according to the actual situation.
When the devices quantity is small or their login passwords are different, you can modify
one IP at a time.
When the devices quantity is big and they share the same login password, you can modify
IP in batches.
Step 1 Click .
Step 2 Select the device that you want to modify IP, and then click the .
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Figure 2-12 Modify IP address (1)
Step 3 Select the mode for setting the IP address according to the actual situation.
Static mode: When you select Static, you need to manually enter Target IP,
Subnet Mask, and Gateway. The IP address of the device will be modified to be
the one you set.
DHCP mode: If the DHCP server is available in the network, when you select
DHCP, the device will automatically obtain the IP address from the DHCP server.
Step 1 Click .
Step 2 Select the devices you want to modify IP.
12
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 3 Click .
Figure 2-13 Modify IP address (2)
Step 4 Select the mode for setting the IP address according to the actual situation.
Static mode: When you select Static, you need to enter Start IP, Subnet Mask,
and Gateway. The IP address of the devices will be modified successively starting
from the entered start IP.
DHCP mode: If the DHCP server is available in the network, when you select
DHCP, the device will automatically obtain the IP address from the DHCP server.
If you select the Same IP check box, the IP address of the devices will be set to the
same one.
Step 5 Click OK to complete modification.
2.5.1 Timing
You can calibrate the device time through configuration.
13
Figure 2-14 Timing
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 Select the time sync way for the device.
Manual sync: Type the time and select the time zone, and then click Manual Sync.
The device time will sync with the setting.
PC sync: Click Sync PC. The device time will sync with the PC time.
NTP sync: Select the Synchronize with NTP check box and set the parameters.
Then click Save.
Implement this step when you use the device in the countries or regions where the DST
is carried out.
14
Table 2-5 DTS
Parameter Description
DST Type Select Date or Week according to the actual situation.
Start Time
Set the DST start time and end time.
End Time
2.5.2.1 Rebooting
You can set the time to automatically reboot device and manually reboot device.
Rebooting will interrupt the business. Stop other operations before rebooting device.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 Select the reboot type for the device according to the actual situation.
15
Auto reboot: Under Auto Reboot, select Auto Reboot check box and set a day of
a week and the specific time, and then click OK.
The device will reboot at the set time.
Manual reboot: Under Manual Reboot, click Reboot.
The device reboots immediately.
2.5.2.2 Restoring
You can restore the factory settings to clear configurations and account files.
Not all devices support clearing network configurations and account files. For some devices, it
only supports restoring NTP and DST settings.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 Click Factory Default to start restoring.
After restoring is completed, the result is displayed.
You can click the success icon ( ) or click the failure icon ( ) for the details.
16
2.5.3 Modifying and Resetting Password
If you select multiple devices, their login passwords must be the same.
If the device is not in the device list, search again. For the details about how to
search devices, see "2.1 Searching Devices."
Step 4 In the Password Type list, select Admin Password or User Password.
17
Table 2-6 Password parameters
Parameter Description
Old Password Enter the device old password.
Enter the new password for the device. There is an indication for the
strength of the password.
New Password The password must consist of 8 to 32 non-blank characters and
contain at least two types of characters among upper case, lower
case, number, and special character (excluding ' " ; : &).
Confirm Password Confirm the new password.
Not all devices support the above password rules, and the actual interface shall
prevail.
After setting the new password is completed, reset the password in Search
setting interface.
If the new password is the same with the old password, a Notice dialog box is
displayed after clicking OK. Then you need to click OK to go back and reset the
new password.
Step 6 Click OK to complete modification.
You can reset the password through the quick response code (QR code) or XML file.
The password resetting operation can only be performed to the devices within the same
local area network.
If you did not enter the reserve information for password reset during device initialization,
you can reset the password only through XML file.
You can reset the password by scanning the QR code. This procedure can only reset one
device at a time.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 Click Reset Password.
A Notice box will be displayed.
The interface might vary with different models, and the actual product shall prevail.
18
Figure 2-18 Notice of password reset
The password must consist of 8 to 32 non-blank characters and contain at least two
types of characters among upper case, lower case, number, and special character
(excluding ' " ; : &).
Step 9 Click OK to start resetting the password.
The result is displayed next to the device after restoring is completed. Click the success
icon ( ) or click the failure icon ( ) for the details.
19
Figure 2-20 Password resetting result (QR code)
You can also reset the password by XML file for one device at a time.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 Click Reset Password.
(Optional) A Notice box will be displayed.
(Optional) Click Agree.
The Reset Password interface is displayed.
The interface might vary with different models, and the actual product shall
prevail.
For some devices only support resetting password by XML file, skip the Notice of
step 4.
When reset passwords for multiple devices, the Tool resets all devices based on
the password reset mode of the first selected device.
20
Figure 2-21 Notice of password reset (2)
The interface might vary with different models, and the actual product shall prevail.
Figure 2-23 Reset password (Export XML)
21
2) Click Next to start exporting.
After the exporting is completed, a Notice interface will be displayed.
3) Click OK.
After completing exporting the XML, the Reset Password-Import XML interface is
displayed.
Step 7 Obtain the result.xml file.
Find the ExportFile.xml under the save path and send it as an attachment to the
designated mailbox indicated on the interface. In a few minutes, you will receive a
result.xml file as an attachment and save it properly.
Step 8 Import XML.
If the Reset Password-Import XML interface is closed, click System Settings >
Reset Password. On the Reset Password tab, click the note under the interface to
continue the operation.
1) Click Open to import the result.xml file from the save path.
Figure 2-24 Reset password (import XML)
22
The password must consist of 8 to 32 non-blank characters and contain at least
two types of characters among upper case, lower case, number, and special
character (excluding ' " ; : &).
2) Enter the registered phone number, and you can check the Set to reserved
phone check box to set it as the reserved phone number.
3) Click Finish to start resetting the password.
The result is displayed next to the device after operation is completed. Click the
success icon ( ) or click the failure icon ( ) for the details.
Figure 2-26 Password resetting result (XML file)
23
Figure 2-27 Alarm configuration
If succeeded, the success icon ( ) appears next to the device, and the alarm
information and the mode information are displayed. See Figure 2-28.
If failed, the failure icon ( ) appears next to the device. Click for the
details.
24
Figure 2-28 Alarm configuration result
25
Parameter Description
Select Delay Alarm in the Status list.
En-Delay If there is an alarm input, the device triggers the alarm after the seconds
configured in the En-Delay list.
Select Delay Alarm in the Status list.
Ex-Delay The protection area will be activated after the seconds configured in the
Ex-Delay list.
2) In the WireZone area, click OK.
Step 6 Set the effectiveness of protection area in armed mode.
1) In the Mode area, click the Stay, Away, Sleep or Custom tab.
2) Enable the protection area according to the actual situation.
3) In the Mode area, click OK.
After clicking OK, the setting of protection area effectiveness is only valid in the
selected alarm mode. Do step 6 again to set the effectiveness of protection area
in another alarm mode.
You need to enable the alarm mode to make the configuration effective. For the
details about how to enable the alarm mode, see "2.5.5.1 Configuring Arm
Settings."
You can enable the alarm mode, and the alarm will be triggered if it meets the alarm conditions.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 In the Armed area, select Arm Mode, and then enter Arm Password.
26
2.5.5.2 Configuring Disarm Settings
You can disable the alarm mode, and the alarm will not be triggered.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 In the Disarmed area, enter Disarmed Password.
If the device is disconnected during upgrading, the Tool will prompt the disconnection and
the device might reboot.
If the upgrade progress does not exceed 50%, the upgrade file transmission is not
completed. Please upgrade the device again after the reconnection.
If the upgrade progress exceeds 50%, the upgrade file transmission is completed and
the device will be upgraded.
Some Android series devices do not support upgrading from higher to lower versions, such
as the VTH53X1 series; otherwise, devices will be crashed. They can only be upgraded
from the lower version to the higher version.
Step 1 Click .
27
Figure 2-29 Upgrade
Step 2 Click Browse next to the device that you want to upgrade, select the upgrade file and
then click Open.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 3 Click Upgrade.
Figure 2-30 Upgrade Setup
If you select the Clear Config check box, the Tool will restore other configurations
except IP and device status of initialization.
Step 5 Click OK to start upgrading and displayed upgrade progress.
28
After upgrade is completed, the device reboots automatically.
Step 1 Click .
Step 2 Select the devices that need to be upgraded.
If the device is not in the device list, searching again. For the details about how to
search devices, see "2.1 Searching Devices."
Make sure that the selected devices are subject to be upgraded to the same
software version.
Step 3 Click .
Figure 2-31 Batch upgrade
If you select the Clear Config check box, the Tool will restore other configurations
except IP and initialization status.
Step 6 Click OK to start upgrading.
29
2.7.1 Creating a Template
You can save or back up the video and audio parameters, indoor machine management, card
management, access password, and access QR code for a device through exporting its
template.
Step 1 Click .
Figure 2-32 Template setup
1) Click .
30
Figure 2-33 Template management
2) Select the device, and enter the template name. For example, you can enter
Template, and then set the information that you want to export.
Step 3 Save the template.
1) Click Get.
The system starts obtaining the information that you want to export and indicates
get config ok! on the interface and the Save as interface is displayed.
Figure 2-34 Save as
For details about how to apply the template, see "2.7.2 Applying the Template."
31
Figure 2-35 Template application (1)
Step 1 Click .
Step 2 Load the template.
1) Click .
Make sure the template exists, if not, see "2.7.1 Creating a Template."
Figure 2-36 Load template
32
Figure 2-37 Template application (2)
You can click the success icon ( ) or click the failure icon ( ) for the details.
33
Figure 2-38 Template application result
Step 1 Click .
34
Figure 2-39 Project configuration (1)
Step 3 Modify the template as needed. Click File, and then click Save as.
Step 4 Select the save path, enter the File Name, such as "SIP template-SIP", and then click
Save.
The file names must include "-SIP"; otherwise, the system cannot recognize and import
the file.
Step 5 In the template, fill in the device information that you need to import.
The information must meet the requirements of Attention in the Guide sheet.
Step 6 Click Import.
35
The Open interface is displayed.
Step 7 Select the template, and then click Open to import it.
After the importing, a Notice interface is displayed. Click OK and it goes back to the
Project Configuration interface.
If you import two templates of different names successively, which contain device with
the same SN, the latest imported template shall govern.
Figure 2-41 Project configuration (2)
36
Figure 2-42 Selecting device
You can click the success icon ( ) or click the failure icon ( ) for the details.
37
After the operation is completed, you can configure the device. For details, see "2.8.2
Configuring VTO and VTH."
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 In the Login Info area, enter the device username and password, and then click
Login.
38
Figure 2-45 VTH
39
Parameter Description
Extension No. Enter the extension number.
Server IP Enter the IP address of the server.
SIP Port Enter the port number of the SIP server.
SIP Realm Enter the domain name of the SIP server.
Register PWD Enter registration password of the SIP server.
DevType Select the device type.
VTO No. Enter the VTO number.
When the device acts as a server, enable or disable group
Group Call
call function.
Villa Call No. Enter the villa call number.
VTO Center Call No. Enter the center call number.
Server Type Select the server type.
Server IP Enter the IP address of the server.
SIP Port Enter the port number of the SIP server.
SIP Realm Enter the domain name of the SIP server.
Register PWD Enter registration password of the SIP server.
Step 6 Click Save.
You can click the success icon ( ) or click the failure icon ( ) for the details.
40
Step 2 Click next to the device type.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 In the Login Info area, enter the device username and password, and then click
Login.
Figure 2-48 VTS (2)
41
Parameter Description
Enter the number in the following format: Building number #
Middle No.
Unit number # VTO number
Enable Select the check box to enable the server.
Step 7 Click Save.
You can click the success icon ( ) or click the failure icon ( ) for the details.
If the device is not in the device list, search again. For the details about how to search
devices, see "2.1 Searching Devices."
Step 4 In the Login Info area, enter the device username and password, and then click
Login.
Step 5 Configure settings.
42
Table 2-11 Single point parameters
Parameter Description
IP Address Enter the IP address of the device.
Network
Subenet Mask Enter the subnet mask of the device.
Info
Gateway Enter the gateway of the device.
Room Enter the room number.
Select the device type as Main VTH or Sub VTH. And
Main IP
then enter the IP address.
Enter the username of the main VTH.
Main User
Local Info It is not available when you select device type as Main
VTH.
Enter the password of the main VTH.
Main Pwd
It is not available when you select device type as Main
VTH.
SIP Server IP Enter the IP address of the SIP server.
SIP Server Port Enter the port number of the SIP server.
SIP Register Pwd Enter the registration password of the SIP server.
SIP
SIP Realm Enter the domain name of the SIP server.
Server
Login User Enter the login username of SIP server.
Login Pawword Enter the login password of SIP server.
Enable Status Select the check box to enable the server.
Select the VTO to connect. Up to connect 1 main VTO
Mater VTO Name and 19 salve VTO.
You can set the mater Vto name.
Network
Mater VTO IP Enter the IP address of the VTO to be connected.
Termi
Mater VTO User Enter the username of the VTO to be connected.
Mater VTO Pwd Enter the password of the VTO to be connected.
Enable Status Select the check box to enable the connection.
Step 6 Click Save.
You can click the success icon ( ) or click the failure icon ( ) for the details.
43
Figure 2-50 Single point (2)
44
Appendix 1 Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic
steps toward protecting and strengthening networks and networked appliances will make them
less susceptible to attacks. Below are some tips and recommendations on how to create a
more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the
system is equipped with the latest security patches and fixes. When the equipment is
connected to the public network, it is recommended to enable the "auto-check for
updates" function to obtain timely information of firmware updates released by the
manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices.
For example, place the equipment in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
45
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. Enable Whitelist
We suggest you to enable whitelist function to prevent everyone, except those with
specified IP addresses, from accessing the system. Therefore, please be sure to add your
computer’s IP address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment,
thus reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check equipment log: By viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need
to save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
46
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
It is recommended that you enable your device's firewall or blacklist and whitelist
feature to reduce the risk that your device
47