background image

User’s Manual 

19 

5.  Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

between 1024~65535, reducing the risk of outsiders being able to guess which ports you 

are using. 

6.  Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure 

communication channel. 

7.  MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the equipment, 

thus reducing the risk of ARP spoofing. 

8.  Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them. 

9.  Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, 

etc., to reduce risks. 

If necessary, it is highly recommended that you use safe modes, including but not limited to 

the following services: 

 

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

 

SMTP: Choose TLS to access mailbox server. 

 

FTP: Choose SFTP, and set up strong passwords. 

 

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10.  Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that 

you use encrypted transmission function, to reduce the risk of audio and video data being 

stolen during transmission. 

Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11.  Secure Auditing 

 

Check online users: we suggest that you check online users regularly to see if the 

device is logged in without authorization.   

 

Check equipment log: By viewing the logs, you can know the IP addresses that were 

used to log in to your devices and their key operations. 

12.  Network Log 

Due to the limited storage capacity of the equipment, the stored log is limited. If you need 

to save the log for a long time, it is recommended that you enable the network log function 

to ensure that the critical logs are synchronized to the network log server for tracing. 

13.  Construct a Safe Network Environment 

In order to better ensure the safety of equipment and reduce potential cyber risks, we 

recommend: 

 

Disable the port mapping function of the router to avoid direct access to the intranet 

devices from external network. 

 

The network should be partitioned and isolated according to the actual network needs. 

If there are no communication requirements between two sub networks, it is 

suggested to use VLAN, network GAP and other technologies to partition the network, 

so as to achieve the network isolation effect. 

Summary of Contents for DHI-IPMECD-2031-RM1515-T20

Page 1: ...I Boom Barrier User s Manual V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...

Page 2: ...PMECD 2031 LM2020 T20 Variable frequency boom barrier with 4 m 13 12 ft folding arm at the left side each of the two sections of the arm is 2 m 6 56 ft Opening closing time 2 s DHI IPMECD 2031 RM2525...

Page 3: ...2032 LM45 T25 Variable frequency boom barrier with 4 5 m 14 76 ft straight arm at the left side Opening closing time 2 5 s DHI IPMECD 2032 RM50 T30 Variable frequency boom barrier with 5 m 16 40 ft s...

Page 4: ...gions For detailed information see the paper manual CD ROM QR code or our official website If there is inconsistency between paper manual and the electronic version the electronic version shall prevai...

Page 5: ...g it Application Environment Requirements Do not aim the Barrier at strong light such as lighting sunlight to focus Transport use and store the Barrier under the allowed humidity and temperature condi...

Page 6: ...rimer will rust easily Do not disassemble the Barrier by yourself Use a soft dry and clean cloth dipped in a small amount of neutral detergent to clean the Barrier Use accessories specified by the man...

Page 7: ...omponents 5 2 3 3 Installation 6 Installation Position Requirements 6 3 1 Installing Casing 6 3 2 Installing Barrier Arm 7 3 3 Adjusting Barrier Arm Length 9 3 4 Electrical Wiring 9 3 5 4 Control Boar...

Page 8: ...this way user experience can be improved and the mechanical and electrical service life of the Barrier can be greatly extended Free of Sensor and Electrical Maintenance The Barrier uses brushless mot...

Page 9: ...position between horizontal and vertical positions When the barrier motor stops swipe down the locking button on the manual handle or locking handle to lock the Barrier It will not be unlocked even i...

Page 10: ...3 2 Structure Appearance 2 1 Straight Arm Barrier Straight arm barrier Figure 2 1 Folding Arm Barrier Folding arm barrier Figure 2 2...

Page 11: ...User s Manual 4 Dimensions 2 2 Dimensions mm inch Figure 2 3...

Page 12: ...escription of components No Description No Description 1 Cover 9 Lever 2 Spring rod 10 Base 3 Driven counterweight rocker arm 11 Motor 4 Mainshaft 12 Driving rocker arm 5 Connecting rod 13 Casing 6 Co...

Page 13: ...expansion bolts that come with the Barrier Installing Casing 3 2 Take out the accessories that come with the Barrier Step 1 Place the casing at the selected position Open the door and use a screwdrive...

Page 14: ...cription 1 Two metal plates 4 Casing of the Barrier 2 Four M12 120 anchor bolts 5 Concrete foundation or pavement 3 Two sets of M12 nuts spring gaskets and flat gaskets Installing Barrier Arm 3 3 Take...

Page 15: ...alling straight arm Figure 3 3 Table 3 2 Description No Description No Description 1 Four M8 16 countersunk bolts 3 Lever 2 Two sets of M8 120 bolts flat gaskets and nuts 4 Straight arm Installing fol...

Page 16: ...ine whether to shorten the barrier arm as required on site and then install the Step 1 barrier arm on the Barrier See 3 3 Installing Barrier Arm In power off state select the right number of springs a...

Page 17: ...Opened 18 Radar loop 8 Closed 19 GND 9 COM 20 RS485_A 10 Open Barrier 21 RS485_B 11 Close Barrier Opening and Closing Control Opening priority falling barrier arm will rise if there is a rise signal a...

Page 18: ...t Auto Closing by Triggering Loop 1 If neither rising nor falling inputs are triggered the risen barrier arm will automatically fall to original position after vehicle leaves loop 1 Auto Opening by Tr...

Page 19: ...lowly or violently shake Factory default 35 F2 Falling deceleration point Incorrect value might cause the barrier arm to fall too slowly or violently shake Factory default 60 F3 Rebound threshold 12 9...

Page 20: ...able default 1 Enable C4 Reduction ratio settings 0 indicates reduction ratio is 50 1 indicates 100 Factory default As required by the user C5 Reserved The settings cannot be modified C6 Reserved The...

Page 21: ...n smash vehicles If the screws are loose first cut off the power manually tighten the screws and then power on Screw looseness Figure 5 1 Table 5 1 Description of screw looseness No Description No Des...

Page 22: ...keep the barrier arm at 40 45 from the horizontal plane to check whether the barrier arm can be still and balanced If not adjust the spring tightness For details see 3 4 Adjusting Barrier Arm Length D...

Page 23: ...0 seconds is considered as an error E7 Software smooth mode code E8 Power failure opening code EE Memory opening code Analysis of Common Faults 6 2 Table 6 2 Analysis of Common Faults FAQ Possible Cau...

Page 24: ...w one of the same specifications The controller rather than the remote control can control the barrier arm to rise or fall The battery of remote control has run out of power Check whether the indicato...

Page 25: ...able the auto check for updates function to obtain timely information of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice t...

Page 26: ...ed Transmission If your audio and video data contents are very important or sensitive we recommend that you use encrypted transmission function to reduce the risk of audio and video data being stolen...

Page 27: ...20 Establish the 802 1x access authentication system to reduce the risk of unauthorized access to private networks Enable IP MAC address filtering function to limit the range of hosts allowed to acce...

Page 28: ...icensors or affiliated companies have been advised of the possibility of such damages Some jurisdictions do not allow limitations on liabilities for personal injuries incidental or consequential damag...

Reviews:

Related manuals for DHI-IPMECD-2031-RM1515-T20