background image

 

17 

6. 

Enable HTTPS 

We suggest you to enable HTTPS, so that you visit Web service through a secure communication 

channel. 

7. 

MAC Address Binding 

We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing 

the risk of ARP spoofing. 

8. 

Assign Accounts and Privileges Reasonably 

According to business and management requirements, reasonably add users and assign a 

minimum set of permissions to them. 

9. 

Disable Unnecessary Services and Choose Secure Modes 

If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to 

reduce risks. 
If necessary, it is highly recommended that you use safe modes, including but not limited to the 
following services: 

  SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication 

passwords. 

  SMTP: Choose TLS to access mailbox server. 

  FTP: Choose SFTP, and set up strong passwords.   

  AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 

10. 

Audio and Video Encrypted Transmission 

If your audio and video data contents are very important or sensitive, we recommend that you 

use encrypted transmission function, to reduce the risk of audio and video data being stolen 
during transmission. 
Reminder: encrypted transmission will cause some loss in transmission efficiency. 

11. 

Secure Auditing

 

  Check online users: we suggest that you check online users regularly to see if the device is 

logged in without authorization.   

  Check device log: By viewing the logs, you can know the IP addresses that were used to log in 

to your devices and their key operations. 

12. 

Network Log 

Due to the limited storage capacity of the device, the stored log is limited. If you need to save the 

log for a long time, it is recommended that you enable the network log function to ensure that 
the critical logs are synchronized to the network log server for tracing. 

13. 

Construct a Safe Network Environment 

In order to better ensure the safety of device and reduce potential cyber risks, we recommend: 

  Disable the port mapping function of the router to avoid direct access to the intranet devices 

from external network. 

  The network should be partitioned and isolated according to the actual network needs. If 

there are no communication requirements between two sub networks, it is suggested to use 
VLAN, network GAP and other technologies to partition the network, so as to achieve the 
network isolation effect. 

  Establish the 802.1x access authentication system to reduce the risk of unauthorized access to 

private networks. 

  Enable IP/MAC address filtering function to limit the range of hosts allowed to access the 

device. 

Summary of Contents for NKB5200

Page 1: ...Network Keyboard Quick Start Guide V1 0 0...

Page 2: ...uch as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other peo...

Page 3: ...eader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks registered trademarks and company names in the manual are properties of their respect...

Page 4: ...uding wearing a helmet and safety belts Do not expose the device to direct sunlight or heat sources Keep the server away from dampness dust or soot Install the server in well ventilated places and do...

Page 5: ...nto the device and make sure that there is no object filled with liquid on the device to prevent liquid from flowing into it Do not disassemble the device without professional instruction Place the de...

Page 6: ...2 2 Shutdown 5 2 3 Screen Lock 5 3 Quick Settings 6 3 1 Initializing the Device 6 3 2 Login 6 3 3 Network Settings 7 3 4 Adding Devices 9 3 5 Video on Wall 10 3 6 PTZ Operations 11 3 6 1 Configuring P...

Page 7: ...ises and the government and is ideal for industries such as the education health transportation intelligent building and finance industry 1 1 Product Appearance 1 1 1 Front Panel Figure 1 1 Front pane...

Page 8: ...hone output port 12 Power port 3 485 port 8 SD slot 13 Power button Powers on and off the device 4 2 USB2 0 ports 9 HDMI signal output port 14 Ground 5 USB3 0 port 10 VGA video output port that output...

Page 9: ...tton description Button Description Button Description F1 Number 1 16 F1 Fast enables No 1to16 plans Supports preview and video wall Goes to the Plan management page to see the plan number Window Pres...

Page 10: ...ey at the same time to select a screen PTZ When powered by USB press and hold PTZ control key to control backlight Scan Press number and Scan key at the same time to enable the scan Tour Press the num...

Page 11: ...Step 2 Enter the username and password and then click Login The page of the keyboard can be operated with touchscreen or an external mouse Figure 2 1 Login 2 2 Shutdown You can power off the keyboard...

Page 12: ...Operate with caution You can press and hold the on the main menu for 5 seconds to initialize the device Step 3 Read and select Consent Agreement License and then click Next Step 4 Enter the new passw...

Page 13: ...oth storage serial port and more User management Add users and configure their permissions 3 Username Click to log out 3 3 Network Settings Configure the IP address and DNS server of the network keybo...

Page 14: ...gateway must be on the same network with the IP address DNS1 IP address of DNS server DNS2 IP address of alternate DNS server Step 2 Optional Connect to WLAN 1 Log in to the network keyboard and then...

Page 15: ...y add and then configure the parameters Figure 3 5 Directly connected device Table 3 3 Parameter description Parameter Description Device Type You can select Directly connected device or Platform from...

Page 16: ...lash drive and then click to import or export device files Click to refresh the page 3 5 Video on Wall Procedure Step 1 Log in to the keyboard Step 2 Click TV wall Step 3 Press and hold the screen to...

Page 17: ...hannel information Step 6 Optional Select Favorites and drag it to the screen to start singnal tour This function is available on NVD Network Video Decoder Related Operations Click to clear screen Cli...

Page 18: ...fixed step length and variable step length Select fixed step length ranges from 1 to 8 the device rotates and the step length keeps at the fixed value Select variable step length the value changes wi...

Page 19: ...to add the current position to be a preset 3 6 2 Configuring Tour Configure tour and the PTZ camera repeats performing tours among the configured presets after configuration Procedure Step 1 Click St...

Page 20: ...uch as tour Procedure Step 1 Click Step 2 Click OK in the pop up window to start auto rotation Figure 3 10 Rotation Step 3 Click again and then click OK in the pop up window to stop rotation 3 6 6 Con...

Page 21: ...art pattern Step 3 Optional Click again and enter Pattern number and then click OK to stop pattern 3 6 7 Configuring Brush Procedure Step 1 Click Step 2 Click OK in the pop up window to start brushing...

Page 22: ...er We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform phy...

Page 23: ...inder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in wi...

Page 24: ...18 More information Please visit official website security emergency response center for security announcements and the latest security recommendations...

Reviews: