User's Manual

63
Cybersecurity Recommendations
Mandatory actions to be taken for cybersecurity
1. Use a strong password
Refer to the following recommendations for setting up the password:
The length should not be less than 8 characters
A strong password is comprised of at least two of these three character types: letters
in upper and lower cases, numbers, and special characters.
Do not contain the username in its forward or reverse sequence.
Do not use continuous characters, such as 123 and abc.
Do not use repeated characters, such as 111 and aaa.
2. Timely update firmware and client software
As is standard procedure in the tech-industry, the firmware of devices should be timely
updated to the latest version to ensure the system is current with the latest security
patches and fixes. With the device connected into Internet, it is recommended to turn
on automatic online update detection to timely get firmware updates launched by
providers.
You are recommended to download and use the latest client software.
Recommended measures to enhance cybersecurity:
1. Physical protection
Physical protection is recommended for devices (especially storage devices), such as
placing them in a special room, special cabinet, and well conduct access control and key
control to prevent damages to hardware and external devices (U disk, serial ports) by
unauthorized persons through physical contact.
2. Change Passwords Regularly
Regularly change the passwords to your devices to help ensure that only authorized
users are able to access the system.
3. Timely set up and update password resetting information
This device supports password reset. To reduce the risk of this function being attacked by
hackers, it is recommended to timely set up password reset, including reserved phone
number/email, and security questions. If any of such information changes, update the
password reset in time. When setting up security questions, set up an answer that is
difficult for someone to guess their way into your system.
4. Enable account lock-down
Account lock-down is enabled by default. To keep your Account safe, it is recommended
to keep this setting. After hackers fail multiple attempts to hack passwords, the
corresponding Account and source IPs are locked.
5. Change HTTP and other default service ports
These ports can be changed to any set of numbers between 102465535. Avoiding the
default ports reduces the risk of hackers being able to guess which ports you are using.
6. Enable HTTPS
Enable HTTPS to access Web services through safe channels.
7. Bind MAC Address
Bind the IP and MAC address of the gateway device to reduce the risk of ARP deception.
8. Reasonably allocate account and permission