LiftControllerCtg
LiftControllerCtg
Foreword
General
This manual introduces the wiring, installation and basic operations of the Access Controller. Read
carefully before using the device, and keep the manual safe for future reference.
Safety Instructions
Revision History
I
Quick Start Guide
As the device user or data controller, you might collect the personal data of others such as their
face, audio, fingerprints, and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.
● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Quick Start Guide
Transportation Requirement
Transport, use and store the Access Controller under allowed humidity and temperature conditions.
Storage Requirement
Store the Access Controller under allowed humidity and temperature conditions.
Installation Requirements
● Do not connect the power adapter to the Access Controller while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the Access Controller.
● Do not connect the Access Controller to two or more kinds of power supplies, to avoid damage
to the Access Controller.
● Improper use of the battery might result in a fire or explosion.
● Please follow the electrical requirements to power the Access Controller.
Following are the requirements for selecting a power adapter.
○ The power supply must conform to the requirements of IEC 60950-1 and IEC 62368-1
standards.
○ The voltage must meet the SELV (Safety Extra Low Voltage) requirements and not exceed
ES-1 standards.
○ When the power of the device does not exceed 100 W, the power supply must meet LPS
requirements and be no higher than PS2.
We recommend using the power adapter provided with the Access Controller.
When selecting the power adapter, the power supply requirements (such as rated voltage)
are subject to the Access Controller label.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the Access Controller in a place exposed to sunlight or near heat sources.
● Keep the Access Controller away from dampness, dust, and soot.
● Install the Access Controller on a stable surface to prevent it from falling.
● Install the Access Controller in a well-ventilated place, and do not block its ventilation.
III
Quick Start Guide
Operation Requirements
IV
Quick Start Guide
Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III
1 Dimensions and Appearance.......................................................................................................................... 1
2 Ports Overview.................................................................................................................................................4
3 Wiring of Locks...............................................................................................................................................11
3.1 Wiring of Magnetic Locks....................................................................................................................11
3.1.1 Wiring of Dual Magnetic Locks with PoE (12 V and Relay).....................................................11
3.1.2 Wiring of Dual Magnetic Locks with 12 V External Power Supply (12 V and Relay)............ 12
3.1.3 Wiring of Dual Magnetic Locks with 12 V External Power Supply (Relay)............................ 13
3.1.4 Wiring of 2-in-1 Magnetic Lock with 12 V External Power Supply (Relay)............................15
3.2 Wiring of Electric Strike Lock.............................................................................................................. 16
3.2.1 Wiring of Dual Electric Strikes with PoE.................................................................................. 16
3.2.2 Wiring of Dual Electric Strikes with 12 V External Power Supply..........................................17
4 Installation..................................................................................................................................................... 20
4.1 Wall Mount........................................................................................................................................... 20
4.2 DIN Rail Mount..................................................................................................................................... 22
5 Access Control Configurations..................................................................................................................... 25
5.1 Networking Diagram........................................................................................................................... 25
5.2 Configurations of Main Controller..................................................................................................... 25
5.2.1 Configuration Flowchart...........................................................................................................25
5.2.2 Initialization...............................................................................................................................26
5.2.3 Logging In.................................................................................................................................. 27
5.2.4 Adding Devices..........................................................................................................................32
5.2.5 Adding Users..............................................................................................................................34
5.2.6 Adding Weekly Plans................................................................................................................ 50
5.2.7 Adding Areas............................................................................................................................. 51
5.2.8 Adding Permission Rules.......................................................................................................... 52
5.2.9 Viewing Authorization Progress.............................................................................................. 54
5.2.10 Configuring Global Alarm linkages (Optional)..................................................................... 55
5.2.11 Configuring Cloud Service......................................................................................................56
5.3 Configurations of Sub Controller....................................................................................................... 58
5.3.1 Initialization...............................................................................................................................58
5.3.2 Logging In.................................................................................................................................. 58
Appendix 1 Security Commitment and Recommendation..........................................................................59
V
Quick Start Guide
1
Quick Start Guide
No. Description
1 Guiding mark
2 Front panel
3 Screw
2
Quick Start Guide
No. Description
1 Tamper alarm switch
2 Upper DIN clip
3 Lower DIN clip
4 Wiring outlet
3
Quick Start Guide
2 Ports Overview
Figure 2-1 Ports
4
Quick Start Guide
Port Description
12 V Supplies 12 VDC power for the reader.
GND Connects the grounding wire.
CASE Connects the reader tampering alarm.
D1
Connects a Wiegand reader.
D0
LED1 Signal response. Connects to the signal wire of the Wiegand reader.
RS485B
Connects a RS-485 reader.
RS485A
BEEP Reserved port
LED2 Reserved port
5
Quick Start Guide
Ports Description
SR1 Door detector for door 1
REX1 Exit button for door 1
ALM1 Alarm input 1
GND Grounding wire
SR2 Door detector for door 2
REX2 Exit button for door 2
ALM2 Alarm input 2
GND Grounding wire
6
Quick Start Guide
Ports Description
– Grounding wire
12 VDC. For powering the Access Controller when not using Power over
+
Ethernet.
7
Quick Start Guide
Ports Description
OUT2+
Alarm output 2
OUT2-
OUT1+
Alarm output 1
OUT1-
Ports Description
REL1 Connects to relay devices. Max voltage = +12 VDC; Max load = 500 mA
REL2 Connect locks to the pins according to the wiring diagram generated
through the hardware configuration. For details, see "3 Wiring of Locks".
– Grounding wire.
8
Quick Start Guide
Ports Description
L1/L2 Power one or two locks (DC output). The lock connector can also be used to
power external devices.
Connects to lock (12 VDC and Max total load = 1000 mA).
– Grounding wire.
9
Quick Start Guide
Ports Description
485A/485B Reserved port. Not used.
GND Grounding wire.
Ports Description
MIC+ Reserved port. Not used.
MIC- Grounding wire.
SPK+ Reserved port. Not used.
SPK- Grounding wire.
10
Quick Start Guide
3 Wiring of Locks
This section uses lock wiring of two-door solution as an example. The wiring of lock might differ
depending on the lock type that you configured.
● Configure lock for Relay.
Relay Open = Unlocked: Set the lock to unlock when the relay is open.
Relay Open = Locked: Set the lock to remain locked when the relay is open.
● Configure lock for 12V.
Fail Secure: Sets the lock to remain locked during power outages.
Fail Safe: Sets the lock to unlock during power outages.
2. Select Fail Safe from the 12V list for lock 2 (door 2).
Figure 3-2 Lock 2 (door 2)
11
Quick Start Guide
12
Quick Start Guide
13
Quick Start Guide
2. Select Relay Open = Unlocked from the Relay list for lock 2 (door 2).
Figure 3-8 Lock 2 (door 2)
14
Quick Start Guide
2. Select Relay Open = Unlocked from the Relay list for lock 2 (door 2).
Figure 3-11 Lock 2 (door 2)
15
Quick Start Guide
2. Select Fail Secure from the 12V list for lock 2 (door 2).
16
Quick Start Guide
17
Quick Start Guide
18
Quick Start Guide
19
Quick Start Guide
4 Installation
4.1 Wall Mount
Procedure
Step 1 Paste the positioning map to the wall at an appropriate position.
Step 2 Drill holes through the marks on the map.
Step 3 Hammer in the expansion tubes, and then remove the map.
Figure 4-1 Hammer in the expansion tubes
Step 4 Slide up the front panel of the Access Controller and remove the panel.
20
Quick Start Guide
Step 5 Attach the back panel of the Access Controller to the wall with self-tapping screws.
Step 6 Wire the Access Controller, bind the wires with nylon cable ties, and then cut off the
excess part of the ties.
Step 7 Align the marks on the front panel with the marks on the back panel, and then slide down
the front panel to cover the Access Controller.
Step 8 Screw a screw into the bottom of the Access Controller to secure it.
21
Quick Start Guide
The DIN rail does not come with the Access Controller.
Step 2 Hook the lower DIN clip of the back panel onto the bottom of the DIN rail, slightly push
upwards the back panel, and then push the back panel backwards to hook the upper DIN
clip onto the top of the DIN rail.
Make sure the clips "grip" the rail on both the top and bottom of the rail.
If you want to remove the Access Controller from the rail, simply push upwards on the
DIN clip, remove the upper clip off the rail, and then lower the back panel to remove the
lower clip off the rail. No screwdrivers or special tools are required.
22
Quick Start Guide
Step 3 Slide up the front panel of the Access Controller to remove the cover.
Step 4 Wire the Access Controller, bind the wires with nylon cable ties, and then cut off the
excessive part of the ties.
23
Quick Start Guide
Step 5 Align the marks on the front panel with the marks on the back panel, and then slide down
the front cover to attach it.
Figure 4-6 Slide down the front cover
Step 6 Screw a screw into the bottom of the Access Controller to secure it.
Step 7 Remove the protection film.
24
Quick Start Guide
25
Quick Start Guide
5.2.2 Initialization
Initialize the main controller when you log in to the webpage for the first time or after it is restored
to its factory defaults.
Prerequisites
Make sure that the computer used to log in to the webpage is on the same LAN as the main
controller.
Procedure
Step 1 Open a browser, go to the IP address (the IP address is 192.168.1.108 by default) of the
main controller.
● The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: upper case and lower case letters, numbers, and
special characters (excluding ' " ; : &). Set a high-security password by following the
password strength prompt.
● Keep the password safe after initialization and change the password regularly to
improve security.
Step 4 Configure the system time, and then click Next.
Figure 5-3 Configure the time
Step 5 (Optional) Select Auto Check for Updates , and then click Completed.
26
Quick Start Guide
The system automatically check is there any higher version available, and inform the user
to update the system. The system automatically checks for new updates, and informs you
when a new update is available.
Step 6 Click Completed.
The system automatically goes to the login page after initialization is successful.
5.2.3 Logging In
For first-time login during initialization, you need to follow the login wizard to configure the type of
main controller and its hardware.
Procedure
Step 1 On the login page, enter the username and password.
● The default administrator name is admin, and the password is the one you set during
initialization. We recommend you change the administrator password regularly to
increase the security of the platform.
● If you forget the administrator login password, you can click Forgot password?.
● Main Control: The main controller comes with a management platform. You can
manage all sub-controllers, configure access control, access personal management on
the platform, and more.
● Sub Control: Sub controllers needs to be added to the management platform of the
main controller or other management platforms such as DSS Pro or SmartPSS Lite. You
can perform the configurations on the webpage of the sub-controller.
Step 3 Select the number of doors, and then enter the name of the door.
Step 4 Configure the parameters of the doors.
27
Quick Start Guide
Parameter Description
28
Quick Start Guide
Parameter Description
● 12 V: The controller provides power to the lock.
Fail secure: When the power is interrupted or fails, the door
stays locked.
Fail safe: When the power is interrupted or fails, the door
automatically unlocks to let people leave.
● Relay: The relay supplies power for the lock.
Power Supply of Locks Relay open = locked: Sets the lock to remain locked when the
relay is open.
Relay open = unlocked: Sets the lock to unlock when the relay
is open.
Bluetooth card can not be selected when you set the combination method to And.
Step 7 Select the unlock methods, and then configure the other parameters.
Figure 5-6 Unlock settings
Parameter Description
Supports unlocking through card, fingerprint, password or
Unlock Method (Multi-select) Bluetooth card. The Bluetooth card function is turned off by
default.
29
Quick Start Guide
Parameter Description
Parameter Description
30
Quick Start Guide
A wiring diagram is generated based on your configurations. You can wire the device
according to the diagram.
31
Quick Start Guide
Related Operations
If you want to change the settings of the hardware, go to Local Device Config > Hardware.
Parameter Description
Enter the name of the Controller. We recommend you name it
Device Name
after its installation area.
Add Mode Select IP to add the Access Controller by entering its IP address.
IP Address Enter the IP address of the controller.
Port The port number is 37777 by default.
Username/Password Enter the username and password of the Controller.
Step 3 Click OK.
32
Quick Start Guide
If the controller was set as the main controller while you were going through the login
wizard, the controller will be added to the management platform automatically and
function as both the main controller and sub controller.
Related Operations
● : Edit the information on the device.
33
Quick Start Guide
You can select devices from the list, and click Device Initialization to initialize them in
batches.
To ensure the security of devices, initialization is not supported for devices on different
segments.
Step 2 Select the Controllers that you want to add to the Platform, and then click Add.
Step 3 Enter the username and password of the sub controller, and then click OK.
The added sub controllers are displayed on the Device Management page.
Related Operations
● Modify IP: Select added devices, and then click Modify IP to change their IP addresses.
● Sync Time: Select added devices, and then click Sync Time to sync the time of the devices with
the NTP server.
● Delete: Select the devices, and then click Delete to delete them.
34
Quick Start Guide
To prevent data loss caused by force majeure damage to the equipment, it is recommended to
regularly export user data for backup purposes.
● Import users: On the Person Management page, click Download Template, enter user
information in the template, and then click Import to import all users.
● Extract all the users: On the Person Management page, click More > Extract Person Info, and
select a device to extract all the users from the sub controller and send them to them the
Platform of the main controller.
Procedure
Step 1 On the home page, select Person Management.
Step 2 Create a department.
1. Click .
2. Enter the name of the department, and then click Add.
Procedure
Step 1 On the home page, select Person Management.
Step 2 Create roles.
● The following roles already exist and cannot be modified or deleted: Default, Manager,
Administrator, Visitor and Employee.
● The only general user type with manager role has the highest authority and it is not
limited by advanced access rules, such as first card unlock, multi-person unlock, anti-
passback, always closed door and unlock methods.
35
Quick Start Guide
1. Click .
2. Enter the name of the role, and then click Add.
Procedure
Step 1 On the home page, select Person Management.
Step 2 Add users.
● Add users one by one.
1. Click Add, and then enter the basic information for the user.
Figure 5-13 Basic information on the user
Parameter Description
User ID The ID of the user.
The department that the user belongs to. For details on how to create
Department
departments, see "5.2.5.1 Adding Departments".
Set a date on which the access permissions of the person will become
Validity Period
effective.
Assign an existing role to the user. You can also click Add Role to create
Role
a new role.
The email address must be the same as the one that was used to sign up
Email
for DMSS.
To Set a date on which the access permissions of the person will expire.
User Name The name of the user.
36
Quick Start Guide
Parameter Description
The type of user.
General User : General users can unlock the door.
VIP User : When the VIP unlocks the door, service personnel will
receive a notice.
Guest User : Guests can unlock the door within a defined period or
for a set number of times. After the defined period expires or the
number of times for unlocking runs out runs out, they cannot unlock
User Type
the door.
Patrol User : Patrol users will have their attendance tracked, but they
have no permission to unlock the door.
Blocklist User : When users in the blocklist unlock the door, service
personnel will receive a notification.
Other User : When they unlock the door, the door will stay unlocked
for 5 more seconds.
Unlock Attempts The number of times a guest user can unlock the door.
2. Click Add.
You can click Add More to add more users.
● Add users through importing the template.
1. Click Import > Download Template to download the user template.
2. Enter user information in the template, and then save it.
3. Click Import, and upload the template to the Platform.
The users are added to the Platform automatically.
● Use Quick Add to easily add users.
1. Click Quick Add.
2. Enter the start number of the user ID, and the quantity.
The platform will generate a sequence of numbers starting from the defined start
number. For example, if the start number is 999, and the quantity is 5, the system
will generate a sequence of numbers from 999 to 1003.
37
Quick Start Guide
38
Quick Start Guide
Add passwords to users for them to gain access by entering their password.
Procedure
Step 1 On the Authentication tab, click Add
Step 2 Enter and confirm the password.
Step 3 Click OK.
39
Quick Start Guide
● If Pin code authentication is not enabled, you can unlock the door by entering the
unlock password in the format of user ID#password# . For example, if the user ID is
123, and the password you set is 12345, and then you must enter 123#12345# to
unlock the door.
● If Pin code authentication is enabled, you can unlock the door by entering the unlock
password in the format of password# . For example, if the user ID is 123, and the
password you set is 12345, and then you must enter 12345# to unlock the door.
Add IC cards or ID cards to users for them to gain access by swiping their cards.
Procedure
Step 1 (Optional) Before you assign cards to users, set the card type and the type of card
number.
1. On the Person Management page, select More > Card Type.
2. If you plan on issuing cards through using enrollment reader, select a card type, and
then click OK.
Make sure that the card type is the same as the card type that will be issued when you
plan on issuing cards through using enrollment reader.
3. Select More > Card No. System.
4. Select decimal format or hexadecimal format for the card number.
Step 2 On the Authentication tab, click Card to add cards.
4 methods are available to add cards.
40
Quick Start Guide
1. Click Add.
2. Click Modify , and then select Enrollment Reader.
Make sure that the card enrollment reader is connected to your computer.
3. Follow the on-screen instructions to download and install the plug-in.
4. Click Read Card, and then swipe the cards on the enrollment reader.
A 60-second countdown is displayed to remind you to swipe the card, and the
system will read the card number automatically. If the 60-second countdown
expires, click Read Card again to start a new countdown.
5. Click Add.
● Use the card reader to read the card number.
41
Quick Start Guide
Figure 5-18 Use the card reader to read the card number
42
Quick Start Guide
Figure 5-19 Issue cards through the enrollment reader or card reader
Related Operations
● : Change the number of the card.
● : Set the card to duress card.
An alarm is triggered when people use the duress card to unlock the door.
● : Delete the card.
Add fingerprints to users for them to use their fingerprints to unlock doors.
Procedure
Step 1 On the Authentication tab, click Fingerprint.
43
Quick Start Guide
Step 2 Connect a fingerprint scanner to the computer, and follow the on-screen instructions to
register the fingerprint.
Step 3 Click Add.
Add Bluetooth cards to users for them to gain access through Bluetooth cards.
Prerequisites
● The Bluetooth unlock function has been turned on.
● The main controller has been added to DMSS. For details, see "5.2.11 Configuring Cloud Service".
● Users have been added to the Platform of the Access Controller. For details, see "5.2.5.3
Configuring Basic User Information".
● General users, such as company employees, have installed and signed up for DMSS with their
email.
The email that users use to sign up for DMSS must be the same as the one you used to add them
to the access controller.
Background Information
Refer to the flowchart for configuring Bluetooth unlock. Administrator and general users need to
perform different operations to complete the process. General users, like company employees, only
need to sign up and log in to DMSS with their email to unlock doors using Bluetooth cards that
were issued to them.
44
Quick Start Guide
Procedure
Step 1 On the tab, click Bluetooth Card.
3 methods are available to add Bluetooth cards.
45
Quick Start Guide
Users who do not have an email or already have 5 Bluetooth cards will be displayed
on the non-requestable list.
Export users that lack emails: Click Export , enter the emails in the correct format,
and then click Import. They will be moved to the requestable list.
46
Quick Start Guide
● If you have requested Bluetooth cards for the user before, you can add the Bluetooth
cards through registration code. using registration codes.
Figure 5-23 The flowchart for requesting through registration code
47
Quick Start Guide
3. On the Bluetooth Card tab, click Request through Registration Code, paste the
registration code, and then click OK.
Figure 5-24 Request through registration code
4. Click OK.
The Bluetooth card is added.
Step 2 Click OK.
Results
After users sign up and log in to DMSS with the Email address, they can open DMSS to unlock the
door through Bluetooth cards. For details, see the user's manual of DMSS.
● Auto Unlock: The door automatically unlocks when you are in the defined Bluetooth range,
which allows the Bluetooth card to transmit signals to the card reader.
In auto unlock mode, the Bluetooth card might continuously unlock the door when you are
within the Bluetooth range for a long time until a failure occurs. Please turn off Bluetooth on the
phone and then turn it on again.
● Shake to Unlock: The door unlocks when you shake your phone to allow the Bluetooth card to
transmit signals to the card reader.
48
Quick Start Guide
Related Operations
● Users can manage Bluetooth cards on DMSS.
Move to the Top: If multiple Bluetooth cards have been added, you can move cards to the
top that are currently in use.
Rename: Rename the Bluetooth card.
Delete: Delete the Bluetooth card.
● Export users that lack emails: Click Export, enter the emails in the correct format and then click
Import. They will be moved to the requestable list.
49
Quick Start Guide
● View the request records: On the Person Management page, click More > Bluetooth Card
Records to view the request status.
Figure 5-26 Request status
View Details: View the details of the request, including user information, reasons for failed
requests and more. You can also request again for failed users.
Request Again: Request again for failed users.
50
Quick Start Guide
Step 3 Drag the slider to adjust the time period for each day.
You can also click Copy to apply the configured time period to other days.
51
Quick Start Guide
52
Quick Start Guide
● Dept: All personnel in the department will be assigned with access permissions.
● Role: All personnel with these roles will be assigned with access permissions.
● User: Only selected users will be assigned with access permissions.
When you want to assign permission to a new person or change access permissions
for an existing person, you can simply add the user in a existing department or link
them with a existing role, they will be automatically assigned access permissions set
for the department or role.
Figure 5-30 Add personnel
You can click to create new permission groups. For details on creating permission
groups, see "5.2.7 Adding Areas".
Step 5 In the Area Info , click Add to select an area, and then click OK.
53
Quick Start Guide
Step 6 In the Time Templates area, select the weekly plan and the holiday plan.
Step 7 Click Apply.
Related Operations
54
Quick Start Guide
● When you have configured both global alarm linkages and local alarm linkages, and if
the global alarm linkages conflict with the local alarm linkages, the last alarm linkages
you have configured will take effective.
● When you have configured alarm linkages for sub controllers through the main
controller, if the main controller has been restored to the factory defaults, we
recommended you restore the sub controller to factory defaults at the same time.
Step 2 Configure the alarm output.
1. Select an alarm input from the alarm input channel list, and then click Link Alarm
Output.
2. Click Add , select an alarm output channel, and then click OK.
Figure 5-33 Alarm output
3. Turn on the alarm output function and then enter the alarm duration.
4. Click Apply.
Step 3 Configure the door linkage.
1. Select an alarm input from the channel list, and then click Add.
2. Select the linkage door, select the door status, and then click OK.
● Always Closed: The door automatically locks when an alarm is triggered.
● Always Open: The door automatically unlocks when an alarm is triggered.
55
Quick Start Guide
If you turn on link fire safety control, all door linkages will automatically change to the
Always Open status, and all the doors will open when the fire alarm is triggered.
4. Click Apply.
You can click Copy to to apply the pre-configured alarm linkages to other alarm input
channels.
If you have changed the password of the Main Controller, or restored it to factory defaults, you
need to delete the controller on DMSS and add it to DMSS again.
56
Quick Start Guide
Procedure
Step 1 On the home page, select Local Device Config > Network Setting > Cloud Service.
Step 2 Turn on the cloud service function.
The cloud service function is turned on by default.
Figure 5-36 Cloud service
57
Quick Start Guide
5.3.1 Initialization
Initialize the sub controller when you log in to the webpage for the first time or after the sub
controller is restored to its factory default settings. For details on how to initialize the sub controller,
see "5.2.2 Initialization".
5.3.2 Logging In
Set the Access Control to sub controller while going through the login wizard. For details, see "5.2.3
Logging In".
58
Quick Start Guide
Account Management
59
Quick Start Guide
Service Configuration
1. Enable HTTPS
It is recommended that you enable HTTPS to access Web services through secure channels.
2. Encrypted transmission of audio and video
If your audio and video data contents are very important or sensitive, we recommend you to use
encrypted transmission function in order to reduce the risk of your audio and video data being
eavesdropped during transmission.
3. Turn off non-essential services and use safe mode
If not needed, it is recommended to turn off some services such as SSH, SNMP, SMTP, UPnP, AP
hotspot etc., to reduce the attack surfaces.
If necessary, it is highly recommended to choose safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption and authentication passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up complex passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up complex passwords.
Network Configuration
Security Auditing
60
Quick Start Guide
By viewing logs, you can learn about the IP addresses that attempt to log in to the device and
key operations of the logged users.
3. Configure network log
Due to the limited storage capacity of devices, the stored log is limited. If you need to save the
log for a long time, it is recommended to enable the network log function to ensure that the
critical logs are synchronized to the network log server for tracing.
Software Security
Physical Protection
It is recommended that you carry out physical protection for devices (especially storage devices),
such as placing the device in a dedicated machine room and cabinet, and having access control
and key management in place to prevent unauthorized personnel from damaging hardware and
other peripheral equipment (e.g. USB flash disk, serial port).
61