Hikvision DS-QAZ0206G1-S Ceiling Secondary Speaker 6W

User Manual - Page 7

For DS-QAZ0206G1-S.

PDF File Manual, 15 pages, Read Online | Download pdf file

DS-QAZ0206G1-S photo
Loading ...
Loading ...
Loading ...
Network Speaker and Audio Column User Manual
3
3. Click OK to select storage path to export.
Parameter import: Device parameter is used to import device parameter file, and it is convenient for the user
to configure device with the same parameter.
1. Click , select the storage path of the device parameter file, and click Open.
2. Click Import to display the prompt.
3. Click OK, enter encryption password, and import device parameter file.
Security Management
Go to Maintenance and Security System Maintenance Security Audit Log to complete the settings.
Enable log upload server: After you enable the enable button, you can enter Log Server IP and Log Server Port
and click Save to upload the log to the server automatically.
Device Debugging
Go to Maintenance and Security System Maintenance Device Debug to complete the settings.
Enable SSH: When remote debugging is required, you can swipe to enable SSH. You can log in to the device
using SSH. Device remote SSH port is 22 by default, and can be edited as needed. When the device is running
normally, it is recommended not to enable SSH to improve device security.
Print Log: Click Export to export and print the log.
Ping Network: Enter Ping network address. Click Ping Network to start the test.
Network Capture: Click Start Capture to capture the packet, and click Stop to stop capturing the packet.
User Management
Click Configure System User Management to enter the configuration page.
You can click to change the administrator password.
Caution
The admin is the default user. The user name cannot be edited. Only its password can be edited.
To ensure the security of account information, it is recommended to set a password between 8 and 16
characters, including at least digits, lowercase letters, uppercase letters, and special characters
(!"#$%&'()*+,-./:;<=>?@@[\\]^_`{|}~. space) and cannot contain user name.
Password length should be less than 8 characters. Password should contain only 1 type of character. Password
should be the same as user name, or the password should be the reverse of user name. The above types of
passwords are risky. To better protect your privacy and improve product security, it is recommended to
change the risky password to high-intensity.
Password strength rule:
1. If the password contains 3 or more types (digits, lowercase letters, uppercase letters, and special characters),
the password security strength is strong.
2. If the password is a combination of digits and special characters, lowercase letters and special characters,
uppercase letters and special characters, lowercase letters and uppercase letters, the password security
strength is medium.
3. If the password is a combination of digits and lowercase letters, digits and uppercase letters, the
password security strength is weak.
Loading ...
Loading ...
Loading ...