DMSS App Users Manual V1.3.03
DMSS App Users Manual V1.3.03
User’s Manual
User’s Manual
V1.3.0
I
Foreword
General
This manual introduces the functions and operations of DMSS App (hereinafter referred to as "the
App").
Software Version
V1.90.000.
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
TIPS Provides methods to help you solve a problem or save you time.
I
Revision History
As the device user or data controller, you might collect personal data of others such as face,
fingerprints, car plate number, email address, phone number, GPS and so on. You need to be in
compliance with the local privacy protection laws and regulations to protect the legitimate rights
and interests of other people by implementing measures include but not limited to: providing clear
and visible identification to inform data subject the existence of surveillance area and providing
related contact.
The manual is for reference only. If there is inconsistency between the manual and the actual
product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the manual.
The manual would be updated according to the latest laws and regulations of related regions.
For detailed information, see the paper manual, CD-ROM, QR code or our official website. If
there is inconsistency between paper manual and the electronic version, the electronic version
shall prevail.
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or errors
in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the properties
II
of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
III
Table of Contents
Foreword ............................................................................................................................................................ I
1 Overview ........................................................................................................................................................ 1
Introduction ................................................................................................................................................................................. 1
Applicable Smartphone .......................................................................................................................................................... 1
2 Basic Operations ............................................................................................................................................ 2
Login ............................................................................................................................................................................................... 2
2.1.1 Logging in to the App ................................................................................................................................................. 2
2.1.2 Upgrading Account...................................................................................................................................................... 4
Adding Devices ........................................................................................................................................................................... 4
2.2.1 Adding Uninitialized Devices ................................................................................................................................... 4
2.2.2 Adding Initialized Devices ......................................................................................................................................... 6
Managing Devices ..................................................................................................................................................................... 8
2.3.1 Device Configuration .................................................................................................................................................. 8
2.3.2 Alarm Subscription....................................................................................................................................................... 9
2.3.3 Device Channel .............................................................................................................................................................. 9
2.3.4 Stream Setting ............................................................................................................................................................... 9
2.3.5 Illumination Settings ................................................................................................................................................... 9
2.3.6 Remote Configuration ..............................................................................................................................................11
2.3.7 Alarm Output ...............................................................................................................................................................21
2.3.8 Storage Manager.........................................................................................................................................................22
2.3.9 Time Zone ......................................................................................................................................................................22
2.3.10 Custom Audio and Video Encryption................................................................................................................23
2.3.11 Device Sharing ..........................................................................................................................................................23
2.3.12 Cloud Update .............................................................................................................................................................27
2.3.13 Other Parameters .....................................................................................................................................................27
2.3.14 Creating Device Card ..............................................................................................................................................28
2.3.15 Deleting Device.........................................................................................................................................................28
3 Live View ...................................................................................................................................................... 30
4 Video Playback ............................................................................................................................................ 34
5 Video Call ..................................................................................................................................................... 37
6 Favorites....................................................................................................................................................... 40
7 Access ........................................................................................................................................................... 41
8 Alarm Control .............................................................................................................................................. 44
Configuring Alarm Devices ..................................................................................................................................................44
Arming and Disarming...........................................................................................................................................................52
8.2.2 Manual Arming and Disarming .............................................................................................................................52
8.2.3 Scheduled Arming and Disarming .......................................................................................................................54
9 File ................................................................................................................................................................ 55
10 Message ..................................................................................................................................................... 57
Subscribing Alarm Messages ............................................................................................................................................57
Viewing Messages .................................................................................................................................................................59
Marking Alarm Messages ...................................................................................................................................................61
Deleting Alarm Messages ...................................................................................................................................................61
IV
11 System Configuration and Account Management .................................................................................. 62
Cybersecurity Recommendations ............................................................................................. 64
V
1 Overview
Introduction
DMSS App is a mobile monitoring software that is designed for professional security surveillance. It
has functions such as live view, video playback, alarm notification push, and alarm control. Various
devices can be added and used with cellular data or Wi-Fi, such as cameras, video recorders, video
intercoms, doorbells, access control devices, and alarm devices.
Applicable Smartphone
1
2 Basic Operations
You can do the operations such as live view, video playback, remote configuration, push notifications,
video talk, and more.
You can use the App after logging in or use it without logging in, and the functions and types of
added devices (divided as account devices and local devices) might vary. For example, cloud storage
and cloud upgrade are available only after login. This manual takes operations after login as an
example.
Account Device
Account devices have following features:
Added after login.
Have "From ***" below the device name.
Account device
Bound to the account, cannot be used after logout, and cannot be added by other accounts, but
can be shared with other users.
Local Devices
Local devices have following features:
Added without login, or added after login but does not have "From ***" below the device name.
Can only be used on the current mobile phone, cannot be shared, but can be added on multiple
mobile phones.
Login
2
On your mobile phone, tap .
4 Function modules Display the main function modules. Tap and drag the icon to change
3
No. Function Description
its place.
Display the added devices.
Tap a thumbnail under the device name to play a single channel. If a
device has several channels, slide thumbnails to the left to view
5 Devices
more.
Tap to play all channels under this device.
Tap to view device details and top the device or move down.
6 Navigation bar Three tabs: Home, Message, and Me.
After upgrading the account, the original device sharing link will become invalid. If you want to enjoy
this service again, establish the sharing again.
Click To Upgrade to go to the upgrading interface.
Click Upgrade on the upgrading interface.
Enter the password to start upgrading.
Adding Devices
Before operating on the App, you need to add devices such as cameras, video recorders, video
intercoms, alarm devices, and access control devices.
Before adding devices, make sure that the device is connected to power and network.
Wi-Fi connection: Connect the device to the same Wi-Fi as the mobile phone.
Wired connection: Connect the device to the same network as the mobile phone.
AP configuration: Turn on device hotspot, and connect the mobile phone to the hotspot.
Uninitialized devices can only be added through scanning device QR code, or manually entering
device SN.
The on-screen instructions might vary depending on the device that you add, and might differ
from the actual interface.
4
On the Home interface, tap , and then select SN/Scan.
Scan device QR code, or manually enter device SN, and then the system will identify the
device type automatically.
If the device type cannot be identified by the system, you need to select the device type.
Follow on-screen instructions to connect the device, and then tap Next.
Enter the Wi-Fi password connected by the mobile phone, and then tap Next.
Tap at the upper-right corner to switch network configuration by Wi-Fi, wire, or AP.
Enter Wi-Fi password
Set device username, device password, enter email address as needed, and then tap OK.
On the Cloud Update Configuration interface, read Cloud Access and Auto-check items,
select them as needed, and then tap OK. The device is initialized.
The Cloud Update Configuration only displays when you add uninitialized devices.
Enter device name, and then save settings.
Configure time zone as needed, and then tap Completed.
5
Time zone configuration is available on account devices.
You can add uninitialized wireless device through AP configuration. This section takes a wireless
alarm hub as an example.
Go through step 1 to step 2 in "2.2.1.1 Adding through Wi-Fi ".
Flip the DIP switch of the hub from STA to AP to configure AP.
You can add device by scanning device QR code or manually entering device SN.
Scan device QR code, or manually enter device SN, and then the system will identify the
device type automatically.
If the device type cannot be automatically identified by the system, you need to select the
6
device type.
Enter device name, device password, and save settings.
Add initialized device (SN/scan)
You can add devices by entering IP of the device or specific domain. This section takes entering
device IP as an example.
7
Select device SN
Managing Devices
You can configure devices, subscribe alarm messages, configure devices remotely, set video streams,
configure alarm output, and more.
Configurations of different devices might vary, and the actual interface shall prevail.
You can also tap the device or channel, and then tap on the interface to go to device
management interface.
Tap Device Configuration, and then you can view and modify device information.
Tap Save.
8
2.3.2 Alarm Subscription
You need to subscribe alarm messages, and then the alarm notification can be pushed to App when
an alarm is triggered. For details, see "10.1 Subscribing Alarm Messages."
9
Illumination settings
10
2.3.6 Remote Configuration
You can remotely configure the device including video detection, alarm setting, camera setting,
storage management, and image adjustment.
In case of detection of moving object within defined conditions and shielded video image, the
system performs alarm linkage actions.
Motion Detection
Alarm linkage action is performed when a moving object appears on the image and its moving
speed reaches the preset sensitivity.
On the Home interface, tap , and then tap Device Details.
Tap Remote Configuration > Video Detection > Motion Detection.
Select the device channel that you want to configure.
Enable Advanced Configuration to configure other parameters.
Advanced configuration (motion detection)
11
Table 2-2 Advanced configuration (motion detection)
Function Description
Set arming periods, and the alarm can only be triggered when it occurs
during the defined period.
Tap , select the date, and then set the start time and end time of the
Arm/Disarm Period
period (up to 6 periods can be set each date). See Figure 2-10.
Tap Copy, select other days as needed, and then the defined arming period
will apply to the selected days.
Set anti-dither period from 0 s to 600 s. Only one motion detection event is
Anti-dither
recorded during the period.
Set sensitivity value from 0 to 100. It is more easier to trigger the alarm with
Sensitivity
higher sensitivity.
Set motion detection region. The whole video image is the effective area
for motion detection by default. See Figure 2-11.
Tap , and then pinch or stretch out with fingers to zoom out or zoom in
the image.
Enable Record, and then the system records automatically when an alarm
Record
is triggered.
Delay The alarm record keeps for the defined time after the alarm is ended.
Enable Alarm Output, and then the connected alarm output device will be
Alarm Output
linked when the alarm is triggered.
Delay The alarm keeps output for the defined time after the alarm is ended.
Enable Snapshot, and then the system automatically captures pictures
Snapshot
when the alarm is triggered.
Arm/Disarm period
12
Region setting
Tap Save.
Video Mask
Alarm is triggered when the monitoring image is shielded and the output video is in single color.
On the Home interface, tap , and then tap Device Details.
Tap Remote Configuration > Video Detection > Video Mask.
Select the device channel that you want to configure.
Enable Advanced Configuration to configure other parameters. For details, see Table 2-2.
Tap Save.
Advanced configuration (video mask)
13
2.3.6.2 Alarm Setting
When the alarm is triggered, alarm action is linked such as recording, snapshot, and alarm output.
Alarm types (mainly for network video recorders) include local alarm, network alarm, IPC external
alarm, IPC offline alarm, and PIR alarm.
14
Advance configuration (local alarm)
15
2.3.6.3 Camera Settings
You can set video stream parameters such as encoding mode, resolution, frame rate, bit rate type,
and bitrate.
On the Home interface, tap , and then tap Device Details.
Tap Remote Configuration > Camera Setting > Video Stream.
Select the device channel you want to configure.
(Optional) Set channel name.
We recommend setting a channel name that is easy to be recognized. You can set according
to device installation place.
Select main stream or sub stream.
Video stream (main)
16
Function Description
Set video stream resolution. The higher the resolution is, the better the video
quality, but the bigger the bandwidth will be.
Resolution
Resolutions supported by the device might vary, and the actual interface shall
prevail.
Set frame rate from 1 to 25. The higher the frame rate is, the more vivid and
Frame rate
fluent the video, but the bigger the bandwidth will be.
CBR (Constant Bit Rate): The bit rate changes little and keeps close to the
defined bit rate value. When the scene is complicated, the image might not be
clear; when the scene is simple, the bandwidth might be wasted.
Bitrate Type
VBR (Variable Bit Rate): The bit rate changes along with monitoring scene, so as
to make image clear under complicated scene and the bandwidth is small
under simple scene.
This parameter can be configured only when the Bitrate Type is set as VBR. The
Quality
better the quality is, the larger the bandwidth will be.
Bitrate Set video bitrate. The higher the bitrate is, the faster the data is transmitted.
Tap Save.
17
Schedule
Tap , select the date, and then set the start time and end time of the period (up to 6
Tap Copy, select other days as needed, and then the set arming period will apply to the
selected days.
18
Set recording
Tap Save.
Adjust live video image such as focus, zoom, brightness, contrast, and image quality.
On the Home interface, tap , and then tap Device Details.
Tap Remote Configuration > Image Adjustment.
Select the device channel you want to configure, and then the system goes to live interface.
Operate on the app.
19
Image adjustment
Focus/Zoom
Tap to adjust focus to make the image clearer
: Flip horizontally.
20
Function Description
: Rotate 180°.
: Brightness.
: Contrast.
Image effect
: Hue.
: Saturation.
: Restore to default.
: Real-time mode.
Video quality
: Fluent mode.
: Auto mode.
21
2.3.8 Storage Manager
You can view storage capacity of the SD card or HDD, and format the SD card or HDD.
On the Home interface, tap , and then tap Device Details.
Tap Storage Manager.
Hardware
22
Time zone
Tap > Sharing to User, enter DMSS account to share the device to users, and then
For devices that do not support entrusting service, Tap to enter DMSS account
23
Control as needed. Live View is selected by default, and you cannot cancel the
selection.
Device sharing
Tap > Entrust to Company, and then scan the corresponding QR code of the installer,
Enter the enterprise information (logo, name, contact information and address), entrusting
period, and then select company viewing permissions.
Click OK.
24
Tap , select devices (up to 20), and then tap Batch Entrust.
Batch entrust (1)
Select the devices to be entrusted, and then click Scan Entrusting QR Code.
25
Batch entrust (2)
Scan the corresponding QR code of the installer to or tap on the upper-right corner of
the interface to upload QR code.
Batch entrust (3)
Enter the enterprise information (logo, name, contact information and address), entrusting
period, and then select company viewing permissions.
Click Submit.
26
2.3.12 Cloud Update
You can view the current device version and upgrade the device when a new version is discovered by
the system.
27
2.3.14 Creating Device Card
You can quickly add devices by scanning the device card.
Tap , select devices (up to 10), and then tap Create Device Card.
You need to enter the password when you import devices by scanning the device card.
Save the QR code of the device card to your album.
28
On the Home interface, tap , and then tap Device Details.
Tap Delete.
29
3 Live View
You can view the monitoring channels and do the operations such as taking snapshots, recording
videos, and adding channels to favorites.
Play a channel: Tap in the window, and then select a channel in the device list to
be played.
Play multiple channels: Tap , select channels in the device list as needed.
When displayed channels exceed the maximum number of displaying window you set,
swipe left or right to view other live videos.
Operate on the live videos.
Live view of a single channel
30
Table 3-1 Live view function icons
Function Description
Tap to go to the device details interface, and then you can configure
Device details your device. For details, see "2.3 Managing Devices."
You can also tap of a device on the Home to view its details.
Window split Tap to change window split modes. You can display in 1, 4, 9, or 16
windows.
Landscape Tap to change image orientation to landscape.
You can configure the capture mode in Me > Setting. For more details,
Snapshot
see "12 System Configuration and Account Management."
Snapshots are saved in the File. You can also tap the captured image at
the lower-left corner on Live interface to go to File. For more details, see
"10 File."
Select a video, and then tap to start recording. Tap the icon again to
stop recording.
Video recording
Recorded videos are saved in the File. You can also tap the video at the
lower-left corner on Live interface to go to File. For more details, see "10 File."
Select a video, and then tap to enable two-way voice call if the function
is supported.
Tap and hold the icon till the Voice Call interface is displayed. Tap the device
to which the channel belongs to enable device talk if the function is
Voice chat
supported.
31
Function Description
Tap , select the preset point, and then tap to turn the PTZ to the
monitoring target.
PTZ control
Use to control PTZ directions: Left, right, up, down, upper-left,
Select a video, tap , and then tap to enable fisheye. Swipe on the
Fisheye screen to adjust the display effect of video image.
Select a video, tap , tap , and then the wiper control interface is
displayed.
Tap Single, the wiper works one time, and then stop.
Wiper Tap Enable, then configure time interval, the wiper works after each time
interval.
Tap Stop, the wiper stops working.
32
Click to select the date to view the corresponding video as needed.
33
4 Video Playback
You can search and play back videos according to time, video type, and channels.
Before playing back videos, you need to set alarm rules and record plan of the channel.
Video playback
Tap to change date and record type. The date with a blue dot
means it has videos.
34
Playback conditions
35
Function Description
Select a video, and then tap to clip the video. Drag time bar, tap to
Clip
set a start point, and then tap to set a stop point.
Snapshot
Video recording See "Table 3-1 Live view function icons."
Fisheye
The color block indicates recorded videos with different types. Grey means all
videos; green means regular videos; red means alarm videos; orange means
Time bar motion detection videos; yellow means smart videos.
Drag the time bar to view the record of any time frame. Pinch or stretch out to
zoom the bar.
36
5 Video Call
You can view the live video of the added video intercoms, realize video call between the device and
App, lock/unlock the door, and more.
Door
Tap to create a favorites group and add the selected channel to the
Favorites
Favorites or to the existing favorites group. See "9 Favorites."
Landscape Tap to change image orientation to landscape.
37
Function Description
App answers the call from VTO: Tap to answer the call; tap to decline
Unlock
VTO that has two locks can be added to the App. Tap , and then select
38
Tap a VTO as needed, and then you can view the call history (such as time, duration), and play back
the recorded video.
Message
39
6 Favorites
You can save channels to Favorites so as to find them and go to live view quickly when needed.
Tap , select one or multiple channels from the same device type, and then tap Next.
Enter favorites name to create the favorites.
Favorites created
40
7 Access
You can view door status, unlock records, remotely unlock the door, watch live video of the access
control device, and more.
Tap to go to device details interface, and then you can view device
configuration, and view unlock records within 7 days.
Device details
You can also tap of the access control device on the Home interface, and
then tap Device Details.
41
Function Description
: Unlock by card.
: Unlock by fingerprint.
: Unlock by password.
: Unlock by face.
: Duress unlock.
More Tap More at the bottom of the interface to view unlock records within 7 days.
Tap Live View to go to live view of the device. See Figure 7-2.
Tap for snapshot.
Live view Tap to mute the video; tap unmute the video.
42
Access (live)
43
8 Alarm Control
You can manage the added alarm hub and its accessories such as switching arming mode, and
configuring accessories.
44
Configure the alarm hub
Parameter Description
Global Arming/Disarming If enabled, arm or disarm all areas with one tap.
Heartbeat The shorter the detector ping interval, the shorter the life
span of the battery.
Anti-tampering Speaker Alert with a siren if the lid of accessories and hub is open.
45
Table 8-1 Hub parameter description
Parameter Description
The signal strength of the mobile network for the active SIM card.
● : Ultra low.
● : Low.
GSM Signal Strength
● : Moderate.
● : High.
● : No.
Internet connection status of the hub via Wi-Fi. For greater reliability,
we recommend installing the hub in places with the signal strength
of 2-3 bars.
● : Ultra low.
Wi-Fi Signal Strength ● : Low.
● : Moderate.
● : High.
● : No.
● : Sufficient electricity.
Storage Battery
● : Moderate electricity.
● : Insufficient electricity.
● : Charging.
● : Disconnected.
● : Disconnected.
46
Parameter Description
47
Configure the door detector
48
Parameter Description
Delay Mode Under Home Mode Enter into delay arming mode at home.
External Detector Access Connect the wired peripheral with alarm cable.
49
Parameters
The signal strength between the hub and the door detector. For
Signal Strength
details, see Figure 8-1.
Battery Level The battery level of the detector. For details, see Figure 8-1.
Online Status Online and offline status of the detector. For details, see Figure 8-1.
Entrance Delay Time The period of time that you can leave through or enter the protection
50
Parameters Value
zone without alarm.
● Entrance delay time: If entrance delay time is configured for the
delayed zone, when you enter an armed delayed zone, the zone
Exit Delay Time alarm will not be triggered until the end of entry delay.
● Exit Delay Time: If exit delay time is configured for the delayed
zone, after you arm the zone on the indoor unit, you can exit the
zone without triggering alarm until the end of exit delay.
If enabled, the door detector will enter into armed state for 24 hours.
24 H Protection Zone
● Enable: .
Status
● Disable: .
51
Arming and Disarming
After the accessory is added to arming mode, an alarm will be trigged only in armed status. It
supports two types of arming and disarming modes: Manual, and scheduled arming and disarming.
Alarm hub
You can manually arm and disarm a single area or all the areas.
52
Figure 4-20 Switch arming mode
53
Figure 4-21 Select mode
54
9 File
You can view, manage, share, and export the recorded videos and snapshots in File.
To share files, tap , select one or multiple files, and then tap .
Files
Tap a video or a snapshot to view details, and for detailed function icon descriptions on
video playback interface, see Table 4-1.
55
Recorded videos
Related Operations
: Play by frame.
56
10 Message
Alarm messages generated by added devices can be pushed to the App. You can view recorded
videos, live video, and picture playback of alarm events.
You need to set alarm rules and enable alarm function of the device or channel.
You need to subscribe alarm messages, and then the alarm notification can be pushed to the App
when the alarm is triggered. Here take local devices as an example.
On the Home interface, tap , and then tap Device Details.
Tap Notification, enable the alarm subscription, and then set the period.
Set alarm types as needed. Multiple alarm types can be selected simultaneously.
57
Table 10-1 Configure alarm subscription
Name Description
Live: Live video is pushed when the alarm is triggered.
Video: The recorded alarm video will be pushed when the alarm is triggered.
Prompt type
You need to install storage device and configure video plan of the device
first.
Select alarm types and its specific alarm event, and then alarm notification will be
pushed when the alarm events happened.
AI analysis: The alarm is triggered when the defined rules are broken such as
Tripwire, Intrusion, Abandoned Object, and Scene Changing.
Stereo Vision: Defined behaviors will be detected and alarmed such as Fall
Detection, People Approaching, and People Stay.
Thermal Alarm: The alarm is triggered when there is abnormal temperature
change in the image such as Fire Alarm, Temperature Contrast Alarm, Hot
Spot Alarm, and Smoking Alarm.
For account devices, you can also arm and disarm the zone.
58
Viewing Messages
59
Function Description
Display messages when alarm events happened.
Alarm message
Tap at the upper-right corner to filter alarm message sources from cameras,
video intercoms, alarm devices, all devices, and more.
On the Message interface, tap an alarm event to view its alarm messages.
60
Display the alarm message
Tap , select one or multiple messages with red dot, and then tap Mark as read to mark
the selected messages as read.
61
11 System Configuration and Account
Management
On Me interface, you can manage account information and configure system parameters.
Me
Table 11-1 Me
Name Description
62
Name Description
Capture mode: Set quantity of manual snapshot for a single
time.
NR setting: The higher the NR level is, the better the noise
reduction will be.
Hard decoding: Enable Hard Decoding, and then the
performance of video stream is improved.
Pushed video delay: Set delay of pushed recordings. Total
pushed video duration=10 s before recording started +
recording duration + delay time you set.
Default page: Select page interface as needed.
Password protection: Enable Password Protection, set
password, and then you need to enter password every time you
log in to the App or return to App from any interruption.
Auto Play When Not in a Wi-Fi Network: Enable Auto Play When
Not in a Wi-Fi Network, and then videos can be automatically
played with other network such as cellular data.
Notification and Period: Enable Notification and set push
period, and then notifications can only be pushed within the
defined period. Period setting is only supported by account
General
devices.
Appearance Mode: Select from dark mode and light mode.
Picture-in-Picture: Enable Picture-in-Picture mode, and then
live video can be viewed on the small floating windows
simultaneously.
Clear Cache: Clear browsing data.
Test Wi-Fi status and notification pushing status of VTO, and
Tool Manager
reset device password.
Region Reselect your region.
View brief function introduction of each module.
63
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped
with the latest security patches and fixes. When the device is connected to the public
network, it is recommended to enable the “auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are
using.
64
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
65