Disclaimer
With regard to the product with internet access, the use of product shall be wholly at your
own risks. Our company shall be irresponsible for abnormal operation, privacy leakage or
other damages resulting from cyber attack, hacker attack, virus inspection, or other internet
security risks; however, Our company will provide timely technical support if necessary.
Surveillance laws vary from country to country. Check all laws in your local region before
using this product for surveillance purposes. We shall not take the responsibility for any
consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters, numbers, and
upper and lower case letters should be used in your password.
Regularly change the passwords of your devices to ensure that only authorized users can
access the system (recommended time is 90 days).
It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to
reduce the risk of outsiders being able to access.
It is recommended to set the firewall of your router. But note that some important ports
cannot be closed (like HTTP port, HTTPS port, Data Port).
It is not recommended to expose the device to the public network. When it is necessary to
be exposed to the public network, please set the external hardware firewall and the
corresponding firewall policy.
It is not recommended to use the v1 and v2 functions of SNMP.
In order to enhance the security of WEB client access, please create a TLS certificate to
enable HTTPS.
Use black and white list to filter the IP address. This will prevent everyone, except those
specified IP addresses from accessing the system.
If you add multiple users, please limit functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or modem. It
is really very convenient for users, but this will increase the risk of data leakage when the
system automatically forwards ports. Disabling UPnP is recommended when the function is
not used in real applications.
Check the log. If you want to know whether your device has been accessed by
unauthorized users or not, you can check the log. The system log will show you which IP
addresses were used to log in your system and what was accessed.