User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Basic Configuration- 4.1 Login
- 4.2 Live
- 4.3 PTZ Operation
- 4.4 Playback
- 4.5 Camera- 4.5.1 Conditions
- 4.5.2 Setting Video Parameters- 4.5.2.1 Video
- 4.5.2.2 Snapshot
- 4.5.2.3 Overlay- 4.5.2.3.1 Configuring Privacy Masking
- 4.5.2.3.2 Configuring Channel Title
- 4.5.2.3.3 Configuring Time Title
- 4.5.2.3.4 Configure Text Overlay
- 4.5.2.3.5 Configure Font Attribute
- 4.5.2.3.6 Configure Picture Overlay
- 4.5.2.3.7 Configure Custom Overlay
- 4.5.2.3.8 Configuring OSD Info
- 4.5.2.3.9 Configuring Counting
- 4.5.2.3.10 Configuring Structured Statistics
- 4.5.2.3.11 Configuring Ranging
- 4.5.2.3.12 Configuring ANPR
- 4.5.2.3.13 Configuring Face Statistics
 
- 4.5.2.4 ROI
- 4.5.2.5 Path
 
- 4.5.3 Audio
 
- 4.6 Network
- 4.7 Storage
- 4.8 System
 
- 5 Event- 5.1 Setting Alarm Linkage
- 5.2 Setting Smart Track
- 5.3 Setting Panoramic Calibration
- 5.4 Setting Video Detection
- 5.5 Setting Smart Motion Detection
- 5.6 Setting Audio Detection
- 5.7 Setting Smart Plan
- 5.8 Setting IVS
- 5.9 Setting Crowd Map
- 5.10 Setting Face Recognition
- 5.11 Setting Face Detection
- 5.12 Setting People Counting
- 5.13 Setting Heat Map
- 5.14 Setting Stereo Analysis
- 5.15 Setting ANPR
- 5.16 Setting Video Structuralization
- 5.17 Setting Relay-in
- 5.18 Setting Abnormality
 
- 6 Maintenance
- Appendix 1 Cybersecurity Recommendations
User’s Manual 
198 
5.  Change Default HTTP and Other Service Ports 
We suggest you to change default HTTP and other service ports into any set of numbers 
between 1024~65535, reducing the risk of outsiders being able to guess which ports you 
are using. 
6.  Enable HTTPS 
We  suggest  you  to  enable  HTTPS,  so  that  you  visit  Web  service  through  a  secure 
communication channel. 
7.  Enable Whitelist 
We  suggest  you  to  enable  whitelist  function  to  prevent  everyone,  except  those  with 
specified IP addresses, from accessing the system. Therefore, please be sure to add your 
computer’s IP address and the accompanying equipment’s IP address to the whitelist. 
8.  MAC Address Binding 
We recommend you to bind the IP and MAC address of the gateway to the equipment, 
thus reducing the risk of ARP spoofing. 
9.  Assign Accounts and Privileges Reasonably 
According to business and management requirements, reasonably add users and assign a 
minimum set of permissions to them.   
10.  Disable Unnecessary Services and Choose Secure Modes 
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 
etc., to reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to 
the following services: 
  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 
passwords. 
  SMTP: Choose TLS to access mailbox server. 
  FTP: Choose SFTP, and set up strong passwords. 
  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 
11.  Audio and Video Encrypted Transmission 
If your audio and video data contents are very important or sensitive, we recommend that 
you use encrypted transmission function, to reduce the risk of audio and video data being 
stolen during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 
12.  Secure Auditing   
  Check online users: we suggest that you check online users regularly to see if the 
device is logged in without authorization. 
  Check equipment log: By viewing the logs, you can know the IP addresses that were 
used to log in to your devices and their key operations. 
13.  Network Log 
Due to the limited storage capacity of the equipment, the stored log is limited. If you need 
to save the log for a long time, it is recommended that you enable the network log function 
to ensure that the critical logs are synchronized to the network log server for tracing. 
14.  Construct a Safe Network Environment 
In order  to  better ensure the  safety  of equipment and  reduce potential cyber risks, we 
recommend: 
  Disable the port mapping function of the router to avoid direct access to the intranet 
devices from external network. 










