background image

User’s Manual 

18 

 Cybersecurity Recommendations 

Appendix 1

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 

connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 

steps toward protecting and strengthening networks and networked appliances will make them 

less susceptible to attacks. Below are some tips and recommendations on how to create a 

more secured security system. 

Mandatory actions to be taken for basic equipment network security: 

1.  Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 

letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.  Update Firmware and Client Software in Time 

 

According to the standard procedure in Tech-industry, we recommend to keep your 

equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the 

system is equipped with the latest security patches and fixes. When the equipment is 

connected to the public network, it is recommended to enable the “auto-check for 

updates” function to obtain timely information of firmware updates released by the 

manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your equipment network security: 

1.  Physical Protection 

We suggest that you perform physical protection to equipment, especially storage devices. 

For example, place the equipment in a special computer room and cabinet, and implement 

well-done access control permission and key management to prevent unauthorized 

personnel from carrying out physical contacts such as damaging hardware, unauthorized 

connection of removable equipment (such as USB flash disk, serial port), etc. 

2.  Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or 

cracked. 

3.  Set and Update Passwords Reset Information Timely   

The equipment supports password reset function. Please set up related information for 

password reset in time, including the end user’s mailbox and password protection 

questions. If the information changes, please modify it in time. When setting password 

protection questions, it is suggested not to use those that can be easily guessed. 

4.  Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 

guarantee the account security. If an attacker attempts to log in with the wrong password 

several times, the corresponding account and the source IP address will be locked. 

Summary of Contents for DHI-IPMECD-2031-RM1515-T20

Page 1: ...I Boom Barrier User s Manual V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Page 2: ...PMECD 2031 LM2020 T20 Variable frequency boom barrier with 4 m 13 12 ft folding arm at the left side each of the two sections of the arm is 2 m 6 56 ft Opening closing time 2 s DHI IPMECD 2031 RM2525...

Page 3: ...2032 LM45 T25 Variable frequency boom barrier with 4 5 m 14 76 ft straight arm at the left side Opening closing time 2 5 s DHI IPMECD 2032 RM50 T30 Variable frequency boom barrier with 5 m 16 40 ft s...

Page 4: ...gions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electronic version shall prevai...

Page 5: ...g it Application Environment Requirements Do not aim the Barrier at strong light such as lighting sunlight to focus Transport use and store the Barrier under the allowed humidity and temperature condi...

Page 6: ...rimer will rust easily Do not disassemble the Barrier by yourself Use a soft dry and clean cloth dipped in a small amount of neutral detergent to clean the Barrier Use accessories specified by the man...

Page 7: ...omponents 5 2 3 3 Installation 6 Installation Position Requirements 6 3 1 Installing Casing 6 3 2 Installing Barrier Arm 7 3 3 Adjusting Barrier Arm Length 9 3 4 Electrical Wiring 9 3 5 4 Control Boar...

Page 8: ...this way user experience can be improved and the mechanical and electrical service life of the Barrier can be greatly extended Free of Sensor and Electrical Maintenance The Barrier uses brushless mot...

Page 9: ...position between horizontal and vertical positions When the barrier motor stops swipe down the locking button on the manual handle or locking handle to lock the Barrier It will not be unlocked even i...

Page 10: ...3 2 Structure Appearance 2 1 Straight Arm Barrier Straight arm barrier Figure 2 1 Folding Arm Barrier Folding arm barrier Figure 2 2...

Page 11: ...User s Manual 4 Dimensions 2 2 Dimensions mm inch Figure 2 3...

Page 12: ...escription of components No Description No Description 1 Cover 9 Lever 2 Spring rod 10 Base 3 Driven counterweight rocker arm 11 Motor 4 Mainshaft 12 Driving rocker arm 5 Connecting rod 13 Casing 6 Co...

Page 13: ...expansion bolts that come with the Barrier Installing Casing 3 2 Take out the accessories that come with the Barrier Step 1 Place the casing at the selected position Open the door and use a screwdrive...

Page 14: ...cription 1 Two metal plates 4 Casing of the Barrier 2 Four M12 120 anchor bolts 5 Concrete foundation or pavement 3 Two sets of M12 nuts spring gaskets and flat gaskets Installing Barrier Arm 3 3 Take...

Page 15: ...alling straight arm Figure 3 3 Table 3 2 Description No Description No Description 1 Four M8 16 countersunk bolts 3 Lever 2 Two sets of M8 120 bolts flat gaskets and nuts 4 Straight arm Installing fol...

Page 16: ...ine whether to shorten the barrier arm as required on site and then install the Step 1 barrier arm on the Barrier See 3 3 Installing Barrier Arm In power off state select the right number of springs a...

Page 17: ...Opened 18 Radar loop 8 Closed 19 GND 9 COM 20 RS485_A 10 Open Barrier 21 RS485_B 11 Close Barrier Opening and Closing Control Opening priority falling barrier arm will rise if there is a rise signal a...

Page 18: ...t Auto Closing by Triggering Loop 1 If neither rising nor falling inputs are triggered the risen barrier arm will automatically fall to original position after vehicle leaves loop 1 Auto Opening by Tr...

Page 19: ...lowly or violently shake Factory default 35 F2 Falling deceleration point Incorrect value might cause the barrier arm to fall too slowly or violently shake Factory default 60 F3 Rebound threshold 12 9...

Page 20: ...able default 1 Enable C4 Reduction ratio settings 0 indicates reduction ratio is 50 1 indicates 100 Factory default As required by the user C5 Reserved The settings cannot be modified C6 Reserved The...

Page 21: ...n smash vehicles If the screws are loose first cut off the power manually tighten the screws and then power on Screw looseness Figure 5 1 Table 5 1 Description of screw looseness No Description No Des...

Page 22: ...keep the barrier arm at 40 45 from the horizontal plane to check whether the barrier arm can be still and balanced If not adjust the spring tightness For details see 3 4 Adjusting Barrier Arm Length D...

Page 23: ...0 seconds is considered as an error E7 Software smooth mode code E8 Power failure opening code EE Memory opening code Analysis of Common Faults 6 2 Table 6 2 Analysis of Common Faults FAQ Possible Cau...

Page 24: ...w one of the same specifications The controller rather than the remote control can control the barrier arm to rise or fall The battery of remote control has run out of power Check whether the indicato...

Page 25: ...able the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice t...

Page 26: ...ed Transmission If your audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen...

Page 27: ...20 Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks Enable IP MAC address filtering function to limit the range of hosts allowed to acce...

Page 28: ...icensors or affiliated companies have been advised of the possibility of such damages Some jurisdictions do not allow limitations on liabilities for personal injuries incidental or consequential damag...

Reviews: