Access Standalone User’s Manual V1.0.
Foreword General This manual introduces the installation and detailed operations of the Access Standalone (hereinafter referred to as "the standalone"). Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in DANGER death or serious injury. Indicates a medium or low potential hazard which, if not avoided, WARNING could result in slight or moderate injury.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners. Please visit our website, contact the supplier or customer service if there is any problem occurred when using the device. If there is any uncertainty or controversy, please refer to our final explanation.
Important Safeguards and Warnings This Chapter describes the contents covering proper handling of the standalone, hazard prevention, and prevention of property damage. Read these contents carefully before using the standalone, comply with them when using, and keep it well for future reference. Operation Requirement Do not place or install the standalone in a place exposed to sunlight or near the heat source. Keep the standalone away from dampness, dust or soot.
harmful interference to radio or television reception, which can be determined by turning the device off and on, try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the device and receiver. Connect the device into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
Table of Contents Foreword .................................................................................................................................................... I Important Safeguards and Warnings .................................................................................................... III 1 Overview................................................................................................................................................. 1 1.1 Introduction ....................
3.10.4 Screensaver.................................................................................................................... 22 3.10.5 Exporting Record ............................................................................................................ 23 3.11 System Information ................................................................................................................... 23 4 Web Operation ...............................................................................
6.2.8 Viewing Access Control Records...................................................................................... 71 6.2.9 Viewing Device Logs ........................................................................................................ 73 Appendix 1 Cybersecurity Recommendations ...................................................................................
1 Overview 1.1 Introduction The access standalone is an access control panel that supports unlock through fingerprint, passwords, and card, and supports their combinations. 1.2 Features Support card unlock, fingerprint unlock and password unlock (unlock button and remote unlock). Support 30,000 users, 30,000 cards, and 3000 fingerprints. Store 150,000 access records and 1000 alarm records.
Figure 1-2 Back view (mm [inch]) Figure 1-3 Side and bottom view (mm [inch]) Table 1-1 Component description No.
2 Installation 2.1 Cable Connections Figure 2-1 Cable connection 2.2 Device Installation The recommended installation height is 1.4–1.6 meters. The standalone supports surface installation and concealed installation.
Surface installation Figure 2-2 Surface installation Installation Procedure Step 1 Stick installation map on the wall, and then drill holes according to hole positions on the map. Step 2 Insert expansion bolt into installation holes. Step 3 Fix the rear cover onto the wall with self-tapping screws. Step 4 Put machine screws through the bottom hole; lock the front cover on to the rear cover.
Concealed installation Figure 2-3 Concealed installation Installation Procedure Step 1 Draw the cables through the outlet. Step 2 Fix the back cover on the mounted box with screws. Step 3 Neaten the cables and buckle the front cover onto the back cover.
3 System Operation 3.1 Button Description Table 3-1 Button description Button Description Go to the first page. Go to the last page. Go to the previous page. Go to the next page. Go to the previous menu. Go to the next menu. 3.2 Initialization Administrator password and an email should be set the first time the standalone is turned on; otherwise the standalone cannot be used.
Administrator and password set on this interface are used to log in to the web management platform. The administrator password can be reset through the email address you entered if the administrator forgets the administrator password. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). After the initialization is completed, the standby interface is displayed.
Figure 3-3 Standby interface Table 3-2 Homepage description No. Description 1 Network status. 2 Date & Time: Current date and time. 3 Displays the configured unlock methods. 4 Password unlock icon. Main menu icon. 5 Only the administrator can enter the main menu. 3.4 Unlocking Methods You can unlock the door through card, password, fingerprint, and the combination mode. For details, see "3.7.1 Unlock Mode." 3.4.1 User Passwords Enter the user passwords, and then you can unlock the door.
Step 2 Tap , and enter the user ID, and then tap OK. Step 3 Enter the user password, and then tap OK. Step 4 Tap . The door is unlocked. 3.4.2 Administrator Password Enter the administrator password, and then you can unlock the door. The administrator password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback. You can only set one administrator password for one standalone. DSS Pro can issue 100 passwords for one standalone at most.
Figure 3-4 Administrator login Step 2 Select a main menu entering method. Figure 3-5 Main menu 3.6 User Management You can add new users, view user lists, admin lists, and modify the administrator password on the User interface. 3.6.1 Adding New Users You can add new users by entering user IDs, names, importing fingerprints, cards, passwords, selecting user levels, and more.
The following figures are for reference only, and the actual interface shall prevail. Step 1 Tap , and then tap . Figure 3-6 New user info Step 2 Configure parameters on the interface. Table 3-3 New user parameter description Parameter Description User ID You can enter user IDs. The IDs consist of 18 characters (including numbers and letters, but not special characters), and each ID is unique. The ID will be allocated when you do not enter one.
Parameter Description User Type Use Time General: General users can unlock the door normally. Restricted: When users in the blacklist unlock the door, service personnel will get a prompt. Guest: Guests are allowed to unlock the door certain times in certain periods. Once they exceed the maximum times and periods, they cannot unlock the door again. Patrol: Patrolling users can get their attendance tracked, but they have no unlock authority.
Figure 3-7 Element (multiple choice) Step 2 Select unlock mode(s). Tap a selected unlock mode again, the unlock mode will be deleted. Step 3 Select a combination mode. + And means "and". For example, if you selected card + FP, it means, to unlock the door, you need to swipe your card first, and then get your fingerprint scanned. / Or means "or". For example, if you selected card/FP, it means, to unlock the door, you can either swipe your card or get your fingerprints scanned.
3.7.3 Lock Holding Time Lock Holding Time is the duration in which the door is unlocked. If the door has been unlocked for a period that exceeds the duration, the door will be automatically locked. 3.7.4 Door Sensor Type There are two door sensor types: NO and NC. 3.7.5 Remote Verification Tap Remote Verification to set the effective time, and then tap to enable it. Remote verification is required when unlock doors. To unlock the door, a door unlock instruction sent by the management platform is needed.
Figure 3-8 IP address configuration Table 3-4 IP configuration parameters Parameter IP Address/Subnet Mask/Gateway IP Address Description The IP address, subnet mask, and gateway IP address should be on the same network segment. After configuration, tap to save the configurations. DHCP DHCP (Dynamic Host Configuration Protocol). When the DHCP is enabled, the IP address can be automatically acquired, and the IP address, subnet mask and gateway IP address cannot be manually configured.
Figure 3-9 Wi-Fi 3.8.2 Wiegand Configuration Select Wiegand Input or Wiegand Output according to the entering direction and exiting direction. Select Comm > Wiegand, and then the Wiegand interface is displayed. Figure 3-10 Wiegand Select Wiegand Input when an external card swipe mechanism is connected to the standalone. Select Wiegand Output when the standalone works as a reader that can be connected to the controller. See Table 3-5.
Table 3-5 Wiegand output Parameter Description Wiegand output type The Wiegand output type determines the card number or the digit of the number than can be recognized by the standalone. Wiegand26, three bytes, six digits. Wiegand34, four bytes, eight digits. Wiegand66, eight bytes, sixteen digits. Pulse Width Pulse Interval Output Data Type You can set pulse width and pulse interval. You can select the types of output data. User ID: If User ID is selected, and then user ID will be output.
Select OSDP Input when card reader of OSDP protocol is connected to the standalone. 3.9 System 3.9.1 Time You can enable 24-hour System, and do date format setting, date setting, time setting, and time zone settings. 3.9.2 Volume Adjustment Tap or to adjust the volume. 3.9.3 ScreenSaver Enable ScreenSaver, the screen saver will be displayed if there is no operation in 30 seconds. To display the screen saver, you need to import pictures first. For details, see "3.10.4 Screensaver.
3.9.4 Privacy Setting Figure 3-12 Privacy setting Table 3-6 Features Parameter Description PWD Reset Enable If the PWD Reset Enable function is enabled, you can reset the password. The PWD Reset function is enabled by default. HTTPS Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used.
3.9.6 Auto Test When you use the standalone for the first time or when the standalone malfunctioned, you can use auto test function to check whether the standalone can work normally. Do actions according to the prompts. When you select Auto Test, the standalone will guide you to do all the auto tests. 3.9.7 Restore to Factory Settings Data will be lost if you restore the access controller to the factory settings. You can select whether to retain user information and logs.
3.10 USB Make sure that the USB is inserted before exporting user information and updating. During exporting or updating, do not pull out the USB or do other operations; otherwise the exporting or updating will fail. You need to import information from one standalone to the USB before using USB to import information to another standalone. USB can also be used to update the program. 3.10.1 USB Export You can export data from the standalone to the USB after inserting the USB.
3.10.2 USB Import Edit the user information in the exported template, and then import it to the standalone. Step 1 Select USB > USB Import. The USB Import interface is displayed. Figure 3-15 USB import Step 2 Select the data type that you want to import. The prompt Confirm to import is displayed. Step 3 Tap OK. Data in the USB will be imported into the standalone. 3.10.3 USB Update USB can be used to update the system. Step 1 Rename the updating file name to "update.bin", and save the "update.
3.10.5 Exporting Record You can search for and export all unlocking records. 3.11 System Information You can search all unlocking records, and view data capacity and device version of the standalone on the System Info interface.
4 Web Operation The standalone can be configured and operated on the web. Through the web you can set network parameters, video parameters, and standalone parameters; and you can also maintain and update the system. 4.1 Initialization You need to set a password and an email address before logging in to the web for the first time. Step 1 Open IE web browser, enter the IP address (the default address is 192.168.1.108) of the standalone in the address bar, and then press Enter key.
Step 3 Click Next. The auto check interface is displayed. Figure 4-2 Auto Test Step 4 You can decide whether to select Auto Check. It is recommended that Auto Check be selected to get the latest program in time. Step 5 Click Next. The configuration is finished. Figure 4-3 Finished configuration Step 6 Click Complete, and the initialization is completed. The web login interface is displayed.
4.2 Login Step 1 Open IE web browser, enter the IP address of the standalone in the address bar, and then press Enter. The login interface is displayed. Figure 4-4 Login Step 2 Enter the username and password. The default administrator name is admin, and the password is the login password after initializing the standalone. Modify the password regularly and keep it properly for the sake of security. If you forget the administrator login password, you can click Forget password? to reset it. See "4.
Figure 4-5 Tips Step 2 Read the tips, and click OK. The Reset Password interface is displayed. Figure 4-6 Reset password Step 3 Scan the QR code on the interface, and you will get the security code. At most two security codes will be generated by scanning the same QR code. To get more security code, refresh the QR code. You need to send the content you get after you scanned the QR code to the designated email address, and then you will get the security code.
Please use the security code within 24 hours after you receive it. Otherwise, it will become invalid. If wrong security codes are entered for consecutive five times, the administrator will be frozen for five minutes. Step 4 Enter the security code you have received. Step 5 Click Next. The Reset Password interface is displayed. Step 6 Reset and confirm the new password.
Parameter Description Opening Method Select a unlock method. Hold Time (Sec.) The duration in which the door is unlocked. If the door has been unlocked for a period that exceeds the duration, the door will be automatically locked., and the range is 1–600 seconds. Normally Open Time Select the period that you set in Time Section. During the selected period, the door is normally open. And it is disabled by default. Normally Close Time Select the period that you set in Time Section.
Figure 4-9 Modifying alarm linkage parameter Table 4-2 Alarm linkage parameter description Parameter Description Alarm Input You cannot modify the value. Keep it default. Name Enter a zone name. Alarm Input Type There are two options: NO and NC. If alarm input type of the alarm device you purchased is NO, then you should select NO; otherwise you should select NC. Fire Link Enable If fire link is enabled, the standalone will output alarms when fire alarms are triggered.
The configuration on the web will be synchronized with the configuration in the client if the standalone is added to a client. 4.5.2 Alarm Log You can view the alarm type and time range on the Alarm Log interface. Step 1 Select Alarm Linkage > Alarm Log. The Alarm Log interface is displayed. Figure 4-10 Alarm log Step 2 Select a time range and alarm type, and then click Query. The query results are displayed. Figure 4-11 Query results 4.
4.6.1 Time Section After setting the period, users can only unlock the door in the periods that you have set. Step 1 Select Time Section > Time Section. Figure 4-12 Time section Step 2 Click Add. Figure 4-13 Add period Step 3 Set the period number and time section name. Select the Enable check box, and the time section as needed. You can configure 128 periods (weeks) whose number range is 0–127, and set four periods on each day of a period (week).
4.6.2 Holiday Group Configuration Configure the start time and end time of a holiday group, and then users cannot unlock the door in the periods that you have set. Step 1 Select Time Section > Holiday Group Config. Figure 4-14 Holiday group configuration Step 2 Click Add. Figure 4-15 Add holiday group Step 3 Set the period number and time section name, and then click Add.
Figure 4-16 Add holiday group configuration Step 4 Set time section name and the time section as needed. You can set group holidays, and then you can set plans for holiday groups. You can configure 128 groups whose number range is 0–127. You can add 16 holidays into a group. 4.6.3 Holiday Plan Configuration You can add holiday groups into holiday plans, and users can only unlock the door in the period that you set. Step 1 Select Time Section > Holiday Plan Config.
Figure 4-18 Add holiday plan Step 3 Set the period number and time section name, select the holiday group number, select the Enable check box, and then set the time section. Step 4 Click OK. 4.7 Data Capacity You can see how many users, cards, fingerprints, alarm logs, records, admin logs and admin quantity the standalone can hold on the Data Capacity interface. Figure 4-19 Data capacity 4.8 Volume Setting You can set beep volume on the Volume Setting interface.
Figure 4-20 Volume setting 4.9 Network Setting 4.9.1 TCP/IP You need to configure IP address and DNS server to make sure that the standalone can communicate with other devices. Precondition Make sure that the standalone is connected to the network correctly. Step 1 Select Network Setting > TCP/IP. Figure 4-21 TCP/IP Step 2 Configure parameters.
Table 4-3 TCP/IP Parameter Description IP Version There is one option: IPv4. MAC MAC address of the standalone is displayed. Mode Static Set IP address, subnet mask, and gateway address manually. DHCP After DHCP is enabled, IP address, subnet mask, and gateway address cannot be configured. If DHCP is effective, IP address, subnet mask, and gateway address will be displayed automatically; if DHCP is not effective, IP address, subnet mask, and gateway address will all be zero.
Table 4-4 Port description Parameter Description You can set the maximum clients that the standalone can be connected to. Max Connection Platform clients like SmartPSS are not counted. TCP Port The value is 37777 by default. HTTP Port The value is 80 by default. If other value is used as port number, you need to add this value behind the address when logging in through browsers. HTTPS Port The value is 443 by default. Step 3 Click OK to complete the setting. 4.9.
Scan the QR code on your web interface to get the serial number of the standalone. 4.10 Data Setting You can set time zone, system time, date, DST, and NTP. When you select Network Time Protocol (NTP), you need to configure the following parameters. You need to enable the NTP Check function first. Server: Enter the IP address of the time server, and time of the standalone will be synchronized with the time server. Port: Enter the port number of the time server.
Figure 4-25 IP authority 4.11.2 System 4.11.2.1 System Service There are four options: SSH, PWD Reset Enable, CGI, and HTTPS. For details, see "3.9.4 Privacy Setting." The system service configuration done on the web page and the configuration on the Privacy Setting interface of the standalone will be synchronized. Figure 4-26 System service 4.11.3 User Management You can add and delete users, modify users’ passwords, and enter an email address for resetting the password when you forget your password.
4.11.3.1 Add Users Click Add on the User Mgmt. interface to add users, and then enter username, password, confirmed password, and remark. Click OK to complete the user adding. 4.11.3.2 Modify User Information You can modify user information by clicking on the User Mgmt. interface. Figure 4-27 User management 4.11.4 Maintenance You can make the standalone restart automatically in idle time to improve the running speed of the standalone. Figure 4-28 Maintenance Select the auto reboot date and time.
4.11.5 Configuration Management When more than one standalones need the same configuration, you can configure parameters for them by importing or exporting configuration files. Figure 4-29 Configuration management 4.11.6 Upgrade Upgrading to the latest system can perfect standalone functions and improve stability. If wrong upgrade file has been used, the system will prompt that the upgrading fails and restart the device automatically. Step 1 Click Upgrade on the navigation bar.
The system checks for upgrade once a day automatically, and there will be system notice if any upgrade is available. 2) We need to collect the data such as device name, firmware version, and device serial number to precede auto-check. The collected information is only used for verifying the legality of cameras and upgrade notice. If there is any upgrade available, click Upgrade, and then the system starts upgrading. Click Manual Check to check for upgrade manually. 4.11.
Figure 4-32 System log 4.12.1 Query Logs Select a time range, type, click Query, and logs meet the conditions will be displayed. 4.12.2 Backup Logs Click Backup to back up the logs displayed. 4.13 Admin Log Enter Admin ID on the Admin Log interface, click Query, and then you will see the administrator’s operation records.
Figure 4-33 Admin log 4.14 Exit Click , click OK, and then you will log out the web interface. Hover over , and then you can see detailed information of the current user.
5 Mobile Phone Operation The standalone can be configured and operated on the mobile phone. Through the mobile phone you can set parameters including network parameters, video parameters, and standalone parameters; and you can also maintain and update the system. Login Step 1 Connect the device and mobile phone to the same network. Step 2 Open the browser on the mobile phone, enter the device IP address (it is displayed on the Wi-Fi interface, and 192.168.1.
The homepage of the web is displayed.
6 Configuration on DSS Pro Before doing access control configurations, you need to add roles, users, and access control devices to DSS Pro; and you can set lock/unlock period and mode for certain users, devices, and door groups; and then you can give access permission to certain users or users in different door groups on DSS Pro Client. For detailed operation, see DSS Pro User's Manual. 6.
Figure 6-2 Homepage Step 4 On the homepage, click Device. Figure 6-3 Device Step 5 Click Add.
Figure 6-4 Add all Step 6 Select Protocol, Manufacturer, Add Type, and Device Category; and enter IP Address, Device Port, User, Password, and more. Select Access Control as Device Category. Different protocols mean you will set different parameters; the actual interface shall prevail. When IP Address is selected, you need to enter IP address of the device you are to add. When Auto Register is selected, you need to enter Registration ID of the device you are to add.
Figure 6-5 Device information Step 8 Enter Device Name, Type, Device SN, Role, Access Control Channel, Alarm Input Channel, Alarm Output Channel, and POS Channel. The type is obtained automatically after Step 7. You can see the device you added on the Device interface. If you want to add more devices, click Continue to add. 6.2 Access Control Management You can do door configuration (door status, NO Period, NC Period, Alarm Enable, Unlock Length, Unlock Method) on DSS Pro Client depending on your needs.
Figure 6-6 Homepage Step 2 Click Access Control. Step 3 On the left side of the interface, right-click an access control channel in the device tree, and select Door Configuration.
Figure 6-8 Door configuration Table 6-1 Door configuration description Parameter Description Set reader direction Indicates the in/out reader based on the wiring of ACS. Door Status Sets the access control status to Normal, Always Open, or Always Close. NO Period If enabled, you can set a period during which the door is always open. NC Period If enabled, you can set a period during which the door is always closed.
Parameter Description Door Sensor Enable Enables the door sensor. The intrusion alarm and timeout alarm take effect only when door sensor is enabled. Super Password Enter the administrator password. Unlock Length Sets the duration of door unlocking. The door is automatically locked when the duration is over. Unlock timeout Unlock duration exceeding the unlock timeout triggers a timeout alarm.
Figure 6-10 Add door group Step 3 Enter door group name, select a time template, and set the holiday schedule. Step 4 Select a channel, and Click OK. Figure 6-11 Door group 6.2.3 Issuing Access Cards You can issue access cards to people one by one or in batches. Step 1 On the Personnel Management interface, double-click any people you need to issue access card to, and then click Authentication tab.
Figure 6-12 Authentication Step 2 Click Edit, and then click in Card section.
Figure 6-13 Editing Step 3 Select the card reader of the access standalone as needed.
Figure 6-14 Reader manager Step 4 Click Add next to Card, and then put the card to the card reader to issue card. The card number is displayed.
Figure 6-15 Card number Step 5 Click OK. The card is issued to the people you selected. You can also issue cards in batches by clicking Batch Issue Card. You can refer to steps of issuing cards to record fingerprints. 6.2.4 First Card Unlock Only after the specified first-card user swipes the card every day can other users unlock the door with their cards. You can set up multiple first cards.
Figure 6-16 Advanced function Step 2 Click the First Card Unlock tab. The First Card Unlock interface is displayed. Step 3 Click Add.
Figure 6-17 First card unlock configuration Step 4 Configure the First Card Unlock parameters and click OK. For details, see Table 6-2. The system displays the First Card Unlock information. See Figure 6-18. First Card Unlock is enabled by default. Table 6-2 First card unlock parameters Parameter Description Door You can select the target access control channel to configure the first card unlock. Time Template First Card Unlock is valid in the time period of the selected time template.
Figure 6-18 First card unlock information Step 5 Click . The icon changing into indicates First Card Unlock is enabled. 6.2.5 Multi-Card Unlock In this mode, multiple groups of users have to swipe cards for an access control channel in an established sequence to unlock the door. One group can have up to 50 users. With Multi-Card Unlock enabled for an access control channel, it supports up to four groups of users being on site at the same time for verification.
Figure 6-19 User group manager 2) Click Add.
Figure 6-20 User group configuration 3) Set up User Group Name. Select users from User List and click OK. You can select up to 64 users. The system displays the user group information. 4) Click in the upper right corner of the User Group Manager interface. Step 4 Configure Multi-Card Unlock. 1) Click Add.
Figure 6-21 Multi-card unlock configuration 2) 3) Select the door to configure Multi-Card Unlock. Select the user group. You can select up to four groups. The system displays the user group information.
Figure 6-22 User group information 4) Enter the Valid Quantity for each group to be on site and the Open Door Mode. Click 5) or to adjust the user sequence for each group to unlock the door. The valid quantity refers to the number of users in each group that must be on site to swipe their cards. Click OK. The system displays the Multi-Card Unlock information.
Figure 6-23 Multi-card unlock details Step 5 Click . The icon changing into indicates Multi-Card Unlock is enabled. 6.2.6 Anti-passback The Anti-passback feature requires a person to exit from the door that he or she came in from. For the same person, an entry record must pair with an exit record. If someone has entered by tailing someone else, which means there is no entry record, this person cannot unlock the door for exit. Step 1 On the Access Control interface, click .
Figure 6-24 Anti-passback configuration Step 4 Configure the anti-passback parameters and click OK. For details, see Table 6-3. The system displays the user selection information. See Figure 6-25. Table 6-3 User selection information description Parameter Description Device You can select the device to configure the anti-passback rules. Anti-passback name You can customize the name of an anti-passback rule. Reset Time(min) The access card becomes invalid if an anti-passback rule is violated.
Figure 6-25 Anti-passback information Step 5 Click . The icon changing into indicates Anti-passback is enabled. 6.2.7 Remote Verification For devices with remote verification, when users unlock the doors with card, fingerprint, or password in the specified time period, it must be confirmed on the platform client before the access controller can be opened. Step 1 On the Access Control interface, click . The Advanced Function interface is displayed. Step 2 Click the Remote Verification tab.
Figure 6-26 Add remote verification Step 4 Select Time Template and access control channel, and click OK. The system displays the remote verification information.
Figure 6-27 Remote verification information Step 5 Click . The icon changing into indicates Remote Verification is enabled. 6.2.8 Viewing Access Control Records You can view access control records. There are two types of records: Online records The access control records stored on the platform. Offline records The access control records stored in the device when it had not been added to the platform or were disconnected from the platform.
Figure 6-28 Log search 6.2.8.2 Offline Records You can extract unlock records and alarm records separately. Step 1 On Access Control interface, click . The Access Control Records interface is displayed. Step 2 Click at the upper-right corner. The Password Verification interface is displayed. Step 3 Enter the login password on the Password Verification interface. The Log Extract interface is displayed.
Figure 6-29 Extract logs during device offline Step 4 Click and set period. Step 5 Click to display devices, and then select a channel. Step 6 Click OK. The records are displayed. 6.2.9 Viewing Device Logs View logs of access control devices, such as login and logout logs. Step 1 On the Access Control interface, click 73 .
Figure 6-30 Device log Step 2 Select a device and time, and then click Search. The search results are displayed.
Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system.
6. 7. 8. 9. 10. 11. 12. 13. 14. We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. Enable Whitelist We suggest you to enable whitelist function to prevent everyone, except those with specified IP addresses, from accessing the system.
suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. It is recommended that you enable your device's firewall or blacklist and whitelist feature to reduce the risk that your device might be attacked.