User's Manual
Face Recognition &Access Control Terminal User Manual
Disclaimer
With regard to the product with internet access, the use of product shall be wholly at
your own risks. Our company shall be irresponsible for abnormal operation, privacy
leakage or other damages resulting from cyber attack, hacker attack, virus inspection, or
other internet security risks; however, our company will provide timely technical support
if necessary.
Surveillance laws vary from country to country. Check all laws in your local region
before using this product for surveillance purposes. We shall not take the responsibility
for any consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters,
numbers, and upper and lower case letters should be used in your password.
It is recommended to change the service default ports (like HTTP-80, HTTPS-443,
etc.) to reduce the risk of outsiders being able to access.
It is recommended to set the firewall of your router. But note that some important
ports cannot be closed (like HTTP port, HTTPS port, Data Port).
It is not recommended to expose the device to the public network. When it is
necessary to be exposed to the public network, please set the external hardware firewall
and the corresponding firewall policy.
It is not recommended to use the v1 and v2 functions of SNMP.
In order to enhance the security of WEB client access, please create a TLS
certificate to enable HTTPS.
Use black and white list to filter the IP address. This will prevent everyone, except
those specified IP addresses from accessing the system.
If you add multiple users, please limit functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or
modem. It is really very convenient for users, but this will increase the risk of data
leakage when the system automatically forwards ports. Disabling UPnP is recommended
when the function is not used in real applications.
Check the log. If you want to know whether your device has been accessed by
unauthorized users or not, you can check the log. The system log will show you which IP
addresses were used to log in your system and what was accessed.