Access Controller (C)_User's Manual_V1.0.3
Access Controller (C)_User's Manual_V1.0.3
User’s Manual
V1.0.3
Foreword
General
This manual introduces the structure, functions and operations of the access controller (hereinafter
referred to as "the Controller").
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
Revision History
Version Revision Content Release Time
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy protection
laws and regulations to protect the legitimate rights and interests of other people by implementing
measures which include but are not limited: Providing clear and visible identification to inform people
of the existence of the surveillance area and provide required contact information.
I
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations and
technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the Controller.
If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the Controller, hazard prevention,
and prevention of property damage. Read carefully before using the Controller, comply with the
guidelines when using it, and keep the manual safe for future reference.
Transportation Requirement
Storage Requirement
Installation Requirements
● Do not connect the power adapter to the Controller while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage is
stable and meets the power supply requirements of the Controller.
● Do not connect the Controller to two or more kinds of power supplies, to avoid damage to the
Controller.
● Improper use of the battery might result in a fire or explosion.
● Personnel working at heights must take all necessary measures to ensure personal safety including
wearing a helmet and safety belts.
● Do not place the Controller in a place exposed to sunlight or near heat sources.
● Keep the Controller away from dampness, dust, and soot.
● Install the Controller on a stable surface to prevent it from falling.
● Install the Controller in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● Use the power cords that are recommended for the region and conform to the rated power
specifications.
III
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Controller label.
● The Controller is a class I electrical appliance. Make sure that the power supply of the Controller is
connected to a power socket with protective earthing.
The Controller must be grounded when it is connected to 220 V mains electricity.
IV
Table of Contents
Foreword ............................................................................................................................................................ I
Important Safeguards and Warnings ............................................................................................................. III
1 Overview ........................................................................................................................................................ 1
Introduction ................................................................................................................................................................................. 1
Features ......................................................................................................................................................................................... 1
Dimensions................................................................................................................................................................................... 1
Application ................................................................................................................................................................................... 2
1.3.1 Two-door One-way....................................................................................................................................................... 2
1.3.2 Two-door Two-way ....................................................................................................................................................... 3
1.3.3 Four-door One-way...................................................................................................................................................... 3
1.3.4 Four-door Two-way ...................................................................................................................................................... 4
1.3.5 Eight-door One-way .................................................................................................................................................... 4
2 Structure ........................................................................................................................................................ 5
Wiring ............................................................................................................................................................................................. 5
2.1.1 Two-door One-way....................................................................................................................................................... 6
2.1.2 Two-door Two-way ....................................................................................................................................................... 7
2.1.3 Four-door One-way...................................................................................................................................................... 8
2.1.4 Four-door Two-way ...................................................................................................................................................... 9
2.1.5 Eight-door One-way ..................................................................................................................................................10
2.1.6 Lock ..................................................................................................................................................................................10
2.1.7 Alarm Input ...................................................................................................................................................................11
2.1.8 Alarm Output ...............................................................................................................................................................11
2.1.9 Card Reader...................................................................................................................................................................13
Power Indicator .........................................................................................................................................................................13
DIP Switch ...................................................................................................................................................................................13
Power Supply .............................................................................................................................................................................14
2.4.1 Door Lock Power Port................................................................................................................................................14
2.4.2 Card Reader Power Port............................................................................................................................................14
3 SmartPSS AC Configuration ........................................................................................................................ 15
Login .............................................................................................................................................................................................15
Initialization................................................................................................................................................................................15
Adding Devices .........................................................................................................................................................................16
3.3.1 Auto Search ...................................................................................................................................................................16
3.3.2 Manual Add ...................................................................................................................................................................17
User Management ...................................................................................................................................................................19
3.4.1 Setting Card Type........................................................................................................................................................19
3.4.2 Adding User ..................................................................................................................................................................20
Configuring Permission .........................................................................................................................................................23
3.5.1 Adding Permission Group .......................................................................................................................................23
3.5.2 Assigning Access Permission ..................................................................................................................................24
Access Controller Configuration.........................................................................................................................................25
3.6.1 Configuring Advanced Functions .........................................................................................................................25
3.6.2 Configuring Access Controller ...............................................................................................................................31
3.6.3 Viewing Historical Event ...........................................................................................................................................34
V
Access Management ...............................................................................................................................................................35
3.7.1 Remotely Opening and Closing Door .................................................................................................................35
3.7.2 Setting Door Status ....................................................................................................................................................36
3.7.3 Configuring Alarm Linkage .....................................................................................................................................37
4 ConfigTool Configuration ........................................................................................................................... 40
Initialization................................................................................................................................................................................40
Adding Devices .........................................................................................................................................................................40
4.2.1 Adding Device Individually .....................................................................................................................................41
4.2.2 Adding Devices in Batches ......................................................................................................................................41
Configuring Access Controller ............................................................................................................................................43
Changing Device Password ..................................................................................................................................................44
Security Recommendation ........................................................................................................ 46
VI
1 Overview
Introduction
The Controller is an access control panel which compensates video surveillance and visual intercom.
It has neat and modern design with strong functionality, suitable for high-end commercial building,
group properties and smart communities.
Features
Adopts SEEC steel board to deliver a high-end appearance.
Supports TCP/IP network communication. Communication data is encrypted for security.
Auto registration.
Supports OSDP protocol.
Supports card, password and fingerprint unlock.
Supports 100,000 users, 100,000 cards, 3,000 fingerprints, and 500,000 records.
Supports interlock, anti-passback, multi-user unlock, first card unlock, admin password unlock,
remote unlock, and more.
Supports tamper alarm, intrusion alarm, door sensor timeout alarm, duress alarm, blocklist alarm,
invalid card exceeding threshold alarm, incorrect password alarm and external alarm.
Supports user types such as general users, VIP users, guest users, blocklist users, patrol users, and
other users.
Supports built-in RTC, NTP time calibration, manual time calibration, and automatic time
calibration functions.
Supports offline operation, event record storage and upload functions, and automatic network
replenishment (ANR).
Support 128 periods, 128 holiday plans, 128 holiday periods, normally open periods, normally
closed periods, remote unlock periods, first card unlock periods, and unlock in periods.
Supports watchdog guard mechanism to ensure the operation stability.
Dimensions
There are five kinds of access controllers, including two-door one-way, two-door two-way, four-door
one-way, four-door two-way, and eight-door one-way. Their dimensions are the same.
1
Dimensions (mm [inch])
Application
2
1.3.2 Two-door Two-way
Application of two-door two-way controller
3
1.3.4 Four-door Two-way
Application of four-door two-way controller
4
2 Structure
Wiring
5
2.1.1 Two-door One-way
Wire a two-door one-way controller
6
2.1.2 Two-door Two-way
Wire a two-door two-way controller
7
2.1.3 Four-door One-way
Wire a four-door one-way controller
8
2.1.4 Four-door Two-way
Wire a four-door two-way controller
9
2.1.5 Eight-door One-way
Wire an eight-door one-way controller
2.1.6 Lock
Select the wiring method according to your lock type.
Electric lock
10
Magnetic lock
Electric bolt
When wiring the two-way dual-door device to the internal alarm output device, select NC/NO
according to the Always Open or Always Close status.
NC: Normally Closed.
NO: Normally Open.
11
Table 2-3 Wiring alarm output
Number of
Type Alarm Output Description
Channels
NO1 AUX1triggers alarm output.
Door timeout and intrusion alarm output
COM1 for door 1.
Two-door Card Reader 1 tamper alarm output.
2
One-way NO2 AUX2 triggers alarm output.
Door timeout and intrusion alarm output
COM2 for door 2.
Card Reader 2 tamper alarm output.
NO1
AUX1/AUX2 triggers alarm output.
COM1
2
NO2
AUX3/AUX4 triggers alarm output.
COM2
Two-door NC1
Card Reader 1/2 tamper alarm output.
Two-way COM1
Door 1 timeout and intrusion alarm output.
NO1
2
NC2
Card Reader 3/4 tamper alarm output.
COM2
Door 2 timeout and intrusion alarm output.
NO2
NO1 AUX1 triggers alarm output.
Door timeout and intrusion alarm output.
Four-door COM1
2 Card Reader tamper alarm output.
One way
NO2
AUX2 triggers alarm output.
COM2
NO1 AUX1 triggers alarm output.
Card Reader 1/2 tamper alarm output.
COM1 Door 1 timeout and intrusion alarm output.
Device tamper alarm output.
NO2 AUX2 triggers alarm output.
Card Reader 1/2 tamper alarm output.
COM2
Door 2 timeout and intrusion alarm output.
NO3 AUX3 triggers alarm output.
Card Reader 5/6 tamper alarm output.
COM3
Door 3 timeout and intrusion alarm output.
Four-door NO4 AUX4 triggers alarm output.
8
Two-way Card Reader 7/8 tamper alarm output.
COM4
Door 4 timeout and intrusion alarm output.
NO5
AUX5 triggers alarm output.
COM5
NO6
AUX6 triggers alarm output.
COM6
NO7
AUX7 triggers alarm output.
COM7
NO8
AUX8 triggers alarm output.
COM8
12
Number of
Type Alarm Output Description
Channels
NO1 AUX1 triggers alarm output.
Card Reader 1 tamper alarm output.
COM1 Door 1 timeout and intrusion alarm output.
Device tamper alarm output.
NO2 AUX2 triggers alarm output.
Card Reader 2 tamper alarm output.
COM2
Door 2 timeout and intrusion alarm output.
NO3 AUX3 triggers alarm output.
Card Reader 3 tamper alarm output.
COM3
Door 3 timeout and intrusion alarm output.
NO4 AUX4 triggers alarm output.
Card Reader 4 tamper alarm output.
Eight-door COM4
8 Door 4 timeout and intrusion alarm output.
One-way
NO5 AUX5 triggers alarm output.
Card Reader 5 tamper alarm output.
COM5
Door 5 timeout and intrusion alarm output.
NO6 AUX6 triggers alarm output.
Card Reader 6 tamper alarm output.
COM6
Door 6 timeout and intrusion alarm output.
NO7 AUX7 triggers alarm output.
Card Reader 7 tamper alarm output.
COM7
Door 7 timeout and intrusion alarm output.
NO8 AUX8 triggers alarm output.
Card Reader 8 tamper alarm output.
COM8
Door 8 timeout and intrusion alarm output.
One door can only connect card readers of the same type, either RS-485 or Wiegand.
Table 2-4 Card reader wire specification description
Card Reader Type Wiring Method Length
RS-485 connection.
RS-485 card reader 100 m
The impedance of a single wire must be within 10Ω.
Wiegand card Wiegand connection.
80 m
reader The impedance of a single wire must be within 2Ω.
Power Indicator
Solid green: Normal.
Red: Abnormal.
Flashes green: Charging.
Blue: The Controller is in the Boot mode.
DIP Switch
13
DIP switch
When 1–8 are all switched to 0, the Controller starts normally after power-on.
When 1–8 are all switched to 1, the Controller enters the BOOT mode after it starts.
When 1, 3, 5 and 7 are switched to 1 and the others are 0, the Controller restores to factory defaults
after it restarts.
When 2, 4, 6 and 8 are switched to 1 and the others are 0, the Controller restores to factory defaults
but keeps user information after it restarts.
Power Supply
14
3 SmartPSS AC Configuration
You can manage the Controller through SmartPSS AC. This section mainly introduces quick
configurations of the Controller. For details, refer to SmartPSS AC user manual.
The screenshots of Smart PSS AC client in this manual are only for reference, and might differ from
the actual product.
Login
Double-click , and then follow the instructions to finish the initialization and log in.
Initialization
Before initialization, make sure the Controller and the computer are on the same network.
On the home page, select Device Manager, and then click Auto Search.
Auto search
If you forget the password, use the DIP switch to restore factory defaults.
15
Set password
Click Finish.
Adding Devices
You need to add the Controller to SmartPSS AC. You can click Auto Search to add and click Add to
manually add devices.
16
Devices
17
Click Device Manager on the lower-left corner.
Click Add on the Device Manager page.
Manual add
18
After adding, SmartPSS AC logs in to the device automatically. After successful login, the
status displays Online. Otherwise, it displays Offline.
User Management
Add users, assign cards to them, and configure their access permissions.
The selected card type must be the same as the actual assigned card type; otherwise card numbers
cannot be read.
Log in to SmartPSS AC.
Click Personnel Manager.
Personnel manager
Click OK.
19
3.4.2 Adding User
Make sure that the image pixels are more than 500 × 500; image size is less than 120 KB.
Add basic information
20
Configure card.
The card number can be read automatically or entered manually. To read the card number
automatically, select a card reader, and then place the card on the card reader.
2) Click Add Fingerprint and press your finger on the scanner three times continuously.
Configure certification
21
Permission configuration
Click Finish.
22
Add users in batches
Configuring Permission
23
Click to add a permission group.
Click OK.
Related Operation
On the Permission Group List page, you can:
24
Click Personnel Manger > Permission Configuration.
Other users can swipe to unlock the door only after the specified first card holder swipes the card. You
can set multiple first-cards. Other users without first-cards can unlock the door only after one of the
first-card holders swipe the first card.
The person to be granted with the first card unlock permission should be of the General user
type and have permissions of the certain doors. Set the type when adding users. For details, see
"3.3.2 Adding User".
For details of assigning permissions, see "3.5 Configuring Permission".
Select Access Configuration > Advanced Config.
Click the First Card Unlock tab.
Click Add.
Configure the First Card Unlock parameters, and then click Save.
25
First card unlock configuration
Users can only unlock the door after defined users or user groups grant access in sequence.
One group can have up to 50 users, and one person can belong to multiple groups.
You can add up to four user groups with multi-card unlock permission for a door, with up to 200
users in total and up to 5 valid users.
First card unlock takes priority over the multi-card unlock, which means if the two rules are both
enabled, the first card unlock comes first. We recommend you not assign multi-card unlock
permission to first card holders.
Do not set the VIP or Patrol type for people in the user group. For details, see "3.3.2 Adding User".
26
For details of permission assignment, see "3.4 Configuring Permission".
Select Access Configuration > Advanced Config.
Click the Multi Card Unlock tab.
Add user group.
1) Click User Group.
User group manager
2) Click Add.
27
User group configuration
3) Set up User Group Name. Select users from User List and click OK. You can select up to
50 users.
4) Click at the upper-right corner of the User Group Manager page.
Configure parameters of multi-card unlock.
1) Click Add.
Multi-card unlock configuration (1)
28
2) Select the door.
3) Select the user group. You can select up to four groups.
Multi-card unlock configuration (2)
4) Enter the Valid Count for each group to be on site, and then select the Unlock Mode.
The valid count refers to the number of users in each group that must be on site to
swipe their cards. Take Figure 3-17 as an example. The door can be unlocked only
after one person of group 1 and 2 people of group 2 have swiped their cards.
Up to five valid users are allowed.
5) Click OK.
(Optional) Click . The icon changing into indicates Multi Card Unlock is enabled.
The newly added Multi Card Unlock is enabled by default.
3.6.1.3 Anti-passback
Users must verify their identities both for entry and exit; otherwise an alarm will be triggered. If a
person enters with valid identity verification and exits without verification, an alarm will be triggered
when they attempt to enter again, and access is denied at the same time. If a person enters without
identity verification and exits with verification, exit is denied when the they attempt to exit.
Select Access Configuration > Advanced Config.
Click Add.
Configure parameters.
1) Select device and enter device name.
2) Select time template.
29
3) Set rest time and the unit is minute.
For example, set the reset time as 30 minutes. If one staff has swiped in but not swiped
out, the anti-pass back alarm will be triggered when this staff tends to swipe in again
within the 30 minutes. The second swipe-in of this staff is only valid after 30 minutes later.
4) Click In Group and select the corresponding reader. And then click Out Group and select
the corresponding reader.
5) Click OK.
The configuration will issue to device and take effect.
Anti-pass back configuration
The access through one or more doors depends on the status of another door (or doors). For example,
when two doors are interlocked, you can access through one door only when the other door is closed.
One device supports two groups of doors with up to 4 doors in each group.
Select Access Configuration > Advanced Config.
Click the Inter-Lock tab.
Click Add.
30
Configure parameters and click OK.
1) Select device and enter device name.
2) Enter remark.
3) Click Add twice to add two door groups.
4) Add doors of the access controller to the needed door group. Click one door group and
then click doors to add.
5) Click OK.
Inter-door lock configuration
(Optional) Click . The icon changing into , which indicates Inter-door Lock is
enabled.
The newly added Inter-door Lock is enabled by default.
31
Configure access door
32
Table 3-3 Parameters of access door
Parameter Description
Door Enter door name.
Reader Direction
Config Click to set reader direction according to actual situations.
Set door status, including Normal, Always Open and Always Close.
Status
It is not the actual door status because the SmartPSS-AC can only send
commands to the device. If you want to know the actual door status,
enable door sensor.
Keep Open Timezone Select time template when door is always open.
Keep Close Timezone Select time template when door is always closed.
Enable alarm function and set alarm type, including intrusion, overtime
Alarm and duress. When alarm enabled, the SmartPSS-AC will receive
uploaded message when the alarm is triggered.
Enable door sensor so that you can know the actual door status. We
Door Sensor
recommend enabling the function.
Administrator Enable and set the administrator password. You can access by entering
Password the password.
Enable the function and set the time template, and then the access of
Remote Verification person has to be verified remotely through the SmartPSS-AC during the
template periods.
Set the unlock holding interval. The door will auto close when time is
Unlock Hold Interval
over.
Set the timeout for alarm. For example, set close timeout as 60 seconds.
Close Timeout If the door is not closed for more than 60 seconds, the alarm message
will be uploaded.
Select And, and select unlock methods. You can open the door by
combining the selected unlock methods.
Unlock Mode Select Or and select unlock methods. You can open the door in one
of the way that you configured.
Select Unlock by time period and select unlock mode for each time
period. The door can only be opened by the selected method(s)
within the defined period.
Click Save.
33
3.6.3 Viewing Historical Event
History door events include events both on SmartPSS-AC and devices. Extract history events from
devices to make sure all event logs are available to be searched for.
Add the needed personnel to the SmartPSS-AC.
Click Access Configuration > History Event on the homepage.
Click on the Access Manager page.
Extract events from door device to the local. Click Extract, set the time, select the door device,
and then click Extract Now.
34
Search for events by filtering conditions
Access Management
Click Access Manager on the homepage. (Or click Access Guide > ).
35
Remotely control the door. There are two methods.
Method 1: Select the door, right click and select Open.
Remotely control (method 1)
Event filtering: Select the event type in the Event Info, and the event list displays events
of the selected types. For example, select Alarm, and the event list only displays alarm
events.
Event refresh locking: Click next to Event Info to lock or unlock the event list, and
then the real-time events cannot be viewed.
Event deleting: Click next to Event Info to clear all events in the event list.
Click Access Manager on the homepage. (Or click Access Guide > ).
Select the door, and then click Always Open or Always Close.
36
Set always open or always close
For anti-pass back function, set the anti-pass back mode in Abnormal of Event Config, and then
configure the parameters in Advanced Config. For details, see "3.5.1 Configuring Advanced
Functions".
Click Event Config on the homepage.
Select the door and select Alarm Event > Intrusion Event.
Click next to Intrusion Alarm to enable the function.
Configure intrusion alarm linkage actions as needed.
Enable alarm sound.
Click the Notify tab, and click next to Alarm Sound. When intrusion event
happens, the access controller warns with alarm sound.
Send alarm mail.
1) Enable Send Mail and confirm to set SMTP. The System Settings page is displayed.
2) Configure SMTP parameters, such as server address, port number, and encrypt mode.
When intrusion events occur, the system sends alarm notifications through mails to the
specified receiver.
37
Configure intrusion alarm
38
Set arming time (method 1)
(Optional) If you want to set the same arming periods for other access controller, click Copy
To, select the access controller, and then click OK.
Click Save.
39
4 ConfigTool Configuration
ConfigTool is mainly used to configure and maintain the device.
Do not use ConfigTool and SmartPSS AC at the same time, otherwise it may cause abnormal results
when you searching for devices.
Initialization
Before initialization, make sure the Controller and the computer are on the same network.
Search for the Controller through the ConfigTool.
1) Double-click ConfigTool to open it.
2) Click Search setting, enter the network segment range, and then click OK.
3) Select the uninitialized Controller, and then click Initialize.
Search for the device
Adding Devices
You can add one or multiple devices according to your actual needs.
40
Make sure that the device and the PC where the ConfigTool is installed are connected; otherwise the
tool cannot find the device.
Click .
41
4.2.2.1 Adding by Searching
You can add multiple devices through searching the current segment or other segments.
You can set the filtering conditions to search the wanted device quickly.
Click .
Setting
Select the searching way. Both the following two ways are selected by default.
Search current segment
Select Current Segment Search. Enter the username and password. The system will
search for devices accordingly.
Search other segment
Select Other Segment Search. Enter the start IP address and end IP address. Enter the
username and the password. The system will search for devices accordingly.
If you select both Current Segment Search and Other Segment Search, the system
searches for devices on the both segments.
The username and the password are the ones used to log in when you want to modify
IP, configure the system, update the device, restart the device, and more.
Click OK to start searching devices.
The searched devices will be displayed in the device list.
You can add the devices by importing an Excel template. You can import up to1000 devices.
Close the template file before importing the devices; otherwise the import will fail.
42
Click , select one device, and then click Export to export a device template.
Follow the on-screen instructions to save the template file locally.
Open the template file, change the existing device information to the information of devices
you want to add.
Import the template. Click Import, select the template and click Open.
The system starts importing the devices.
Click OK.
The newly imported devices display in the device list.
The screenshots and parameters might be different depending on the device types and models.
Set the card number processing rule of the access controller. It is No Convert by
default. When the card reading result does not match the actual card No., select
Byte Revert or HIDpro Convert.
Card No. Byte Revert: When access controller works with third-party readers, and the
card number read by the card reader is in the reverse order from the actual
card number. For example, the card number read by the card reader is
hexadecimal 12345678 while the actual card number is hexadecimal
78563412, and you can select Byte Revert.
43
Parameter Description
HIDpro Convert: When access controller works with HID Wiegand readers,
and the card number read by the card reader does match the actual card
number, you can select HIDpro Revert to match them. For example, the card
number read by the card reader is hexadecimal 1BAB96 while the actual card
number is hexadecimal 78123456,
TCP Port Modify TCP port number of the Device.
Bitrate If card reading is slow, you can increase bitrate. It is 9600 by default.
OSDPEnable When access controller works with third-party readers through ODSP protocol,
enable ODSP.
(Optional) Click Apply to, select the devices that you need to sync the configured
parameters to, and then click Config.
If succeeded, is displayed on the right side of the device; if failed, is displayed. You
can click the icon to view detailed information.
Click next to the device type, and then select one or multiple devices.
If you select multiple devices, the login passwords must be the same.
Set the password.
Follow the password security level hint to set a new password.
44
Table 4-3 Password parameters
Parameter Description
Enter the device old password. To make sure that the old password is
Old Password
entered correctly, you can click Check to verify.
Enter the new password for the device. There is an indication for the
strength of the password.
New Password The password must consist of 8 to 32 non-blank characters and contain at
least two types of characters among upper case, lower case, number, and
special character (excluding ' " ; : &).
Confirm Password Confirm the new password.
Click OK to complete modification.
45
Security Recommendation
Account Management
1. Use complex passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters;
● Include at least two types of characters: upper and lower case letters, numbers and symbols;
● Do not contain the account name or the account name in reverse order;
● Do not use continuous characters, such as 123, abc, etc.;
● Do not use repeating characters, such as 111, aaa, etc.
2. Change passwords periodically
It is recommended to periodically change the device password to reduce the risk of being
guessed or cracked.
3. Allocate accounts and permissions appropriately
Appropriately add users based on service and management requirements and assign minimum
permission sets to users.
4. Enable account lockout function
The account lockout function is enabled by default. You are advised to keep it enabled to protect
account security. After multiple failed password attempts, the corresponding account and source
IP address will be locked.
5. Set and update password reset information in a timely manner
The device supports password reset function. To reduce the risk of this function being used by
threat actors, if there is any change in the information, please modify it in time. When setting
security questions, it is recommended not to use easily guessed answers.
Service Configuration
1. Enable HTTPS
It is recommended that you enable HTTPS to access web services through secure channels.
2. Encrypted transmission of audio and video
If your audio and video data contents are very important or sensitive, it is recommended to use
encrypted transmission function in order to reduce the risk of your audio and video data being
eavesdropped during transmission.
3. Turn off non-essential services and use safe mode
If not needed, it is recommended to turn off some services such as SSH, SNMP, SMTP, UPnP, AP
hotspot etc., to reduce the attack surfaces.
If necessary, it is highly recommended to choose safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption and authentication passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up complex passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up complex passwords.
4. Change HTTP and other default service ports
It is recommended that you change the default port of HTTP and other services to any port
between 1024 and 65535 to reduce the risk of being guessed by threat actors.
46
Network Configuration
1. Enable Allow list
It is recommended that you turn on the allow list function, and only allow IP in the allow list to
access the device. Therefore, please be sure to add your computer IP address and supporting
device IP address to the allow list.
2. MAC address binding
It is recommended that you bind the IP address of the gateway to the MAC address on the device
to reduce the risk of ARP spoofing.
3. Build a secure network environment
In order to better ensure the security of devices and reduce potential cyber risks, the following
are recommended:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network;
● According to the actual network needs, partition the network: if there is no communication
demand between the two subnets, it is recommended to use VLAN, gateway and other
methods to partition the network to achieve network isolation;
● Stablish 802.1x access authentication system to reduce the risk of illegal terminal access to
the private network.
Security Auditing
1. Check online users
It is recommended to check online users regularly to identify illegal users.
2. Check device log
By viewing logs, you can learn about the IP addresses that attempt to log in to the device and key
operations of the logged users.
3. Configure network log
Due to the limited storage capacity of devices, the stored log is limited. If you need to save the
log for a long time, it is recommended to enable the network log function to ensure that the
critical logs are synchronized to the network log server for tracing.
Software Security
1. Update firmware in time
According to the industry standard operating specifications, the firmware of devices needs to be
updated to the latest version in time in order to ensure that the device has the latest functions
and security. If the device is connected to the public network, it is recommended to enable the
online upgrade automatic detection function, so as to obtain the firmware update information
released by the manufacturer in a timely manner.
2. Update client software in time
It is recommended to download and use the latest client software.
Physical Protection
It is recommended that you carry out physical protection for devices (especially storage devices),
such as placing the device in a dedicated machine room and cabinet, and having access control and
key management in place to prevent unauthorized personnel from damaging hardware and other
peripheral equipment (e.g. USB flash disk, serial port).
47